Description
A vulnerability was determined in Tenda i6 1.0.0.7(2204). Affected by this issue is the function R7WebsSecurityHandlerfunction of the component HTTP Handler. This manipulation causes path traversal. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-04-10
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote File Disclosure
Action: Immediate Patch
AI Analysis

Impact

An HTTP path traversal vulnerability exists in the R7WebsSecurityHandler function of the Tenda i6 router firmware 1.0.0.7. The flaw allows an unauthenticated remote attacker to construct file paths that escape the intended directory boundaries, enabling read access to arbitrary files on the device. This can expose sensitive configuration files or firmware binaries, potentially enabling further attacks such as code execution or device takeover.

Affected Systems

Systems affected are Tenda i6 routers running firmware version 1.0.0.7(2204). No other products or vendors are listed. Only devices with this specific firmware revision are vulnerable.

Risk and Exploitability

CVSS score of 6.9 indicates moderate to high risk. EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, but the publicly disclosed exploit demonstrates that remote attackers can exploit it over the HTTP interface. Because the attack vector is network-based, devices exposed to the internet or unsecured local networks are at risk. Immediate assessment and remediation are advised.

Generated by OpenCVE AI on April 10, 2026 at 06:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update for Tenda i6 or install the vendor patch that removes the path traversal.
  • If no firmware update is available, restrict access to the device’s HTTP management interface by placing the router behind a firewall or disabling it entirely if not needed.
  • Use network segmentation to ensure that the router is not directly reachable from the public internet or from untrusted networks.
  • Monitor router logs for unusual HTTP requests that include traversal sequences such as “..” or “..%2f”.

Generated by OpenCVE AI on April 10, 2026 at 06:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda i6
Vendors & Products Tenda
Tenda i6

Fri, 10 Apr 2026 05:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda i6 1.0.0.7(2204). Affected by this issue is the function R7WebsSecurityHandlerfunction of the component HTTP Handler. This manipulation causes path traversal. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Title Tenda i6 HTTP R7WebsSecurityHandlerfunction path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T15:54:20.628Z

Reserved: 2026-04-09T15:51:37.912Z

Link: CVE-2026-6024

cve-icon Vulnrichment

Updated: 2026-04-10T15:46:49.066Z

cve-icon NVD

Status : Received

Published: 2026-04-10T06:16:06.993

Modified: 2026-04-10T06:16:06.993

Link: CVE-2026-6024

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:42Z

Weaknesses