Impact
An HTTP path traversal vulnerability exists in the R7WebsSecurityHandler function of the Tenda i6 router firmware 1.0.0.7. The flaw allows an unauthenticated remote attacker to construct file paths that escape the intended directory boundaries, enabling read access to arbitrary files on the device. This can expose sensitive configuration files or firmware binaries, potentially enabling further attacks such as code execution or device takeover.
Affected Systems
Systems affected are Tenda i6 routers running firmware version 1.0.0.7(2204). No other products or vendors are listed. Only devices with this specific firmware revision are vulnerable.
Risk and Exploitability
CVSS score of 6.9 indicates moderate to high risk. EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, but the publicly disclosed exploit demonstrates that remote attackers can exploit it over the HTTP interface. Because the attack vector is network-based, devices exposed to the internet or unsecured local networks are at risk. Immediate assessment and remediation are advised.
OpenCVE Enrichment