Description
A vulnerability was identified in Tenda i9 1.0.0.5(2204). This vulnerability affects the function R7WebsSecurityHandlerfunction of the component HTTP Handler. The manipulation leads to path traversal. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Published: 2026-04-26
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote File Disclosure via Path Traversal
Action: Assess Impact
AI Analysis

Impact

The vulnerability resides in the R7WebsSecurityHandlerfunction of Tenda i9’s HTTP handler and allows an attacker to manipulate path inputs, resulting in a path traversal flaw (CWE‑22). By forging requests, an adversary can read sensitive files residing on the device’s storage. The flaw is an information disclosure vulnerability that can be triggered remotely through the device’s web interface. Remote exploitation is feasible and publicly available exploits may already be in circulation.

Affected Systems

Tenda i9 firmware 1.0.0.5 (build 2204). No other firmware revisions are listed as affected, and the vulnerability is tied exclusively to the HTTP handler component exposed by this model.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity, while the EPSS score of less than 1% suggests a low current exploitation probability. The vulnerability is not present in the CISA KEV catalog, implying no confirmed widespread exploitation has been recorded. However, because the attack vector is remote and relies on simple HTTP requests, a determined attacker can attempt traversal patterns to read files from the device. Effective mitigation relies on preventing unauthorised web access or applying a vendor provided patch if available.

Generated by OpenCVE AI on April 28, 2026 at 13:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware upgrade provided by Tenda that includes a fix for the path traversal issue, if available.
  • Restrict access to the device’s web management interface by configuring network firewall or VPN, limiting it to trusted IP addresses or internal LAN only.
  • Enable detailed logging on the device (if supported) or monitor external host logs for repeated path traversal patterns, and block suspicious requests.

Generated by OpenCVE AI on April 28, 2026 at 13:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:i9:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:i9_firmware:1.0.0.5\(2204\):*:*:*:*:*:*:*

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda i9
Vendors & Products Tenda i9

Mon, 27 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda i9 1.0.0.5(2204). This vulnerability affects the function R7WebsSecurityHandlerfunction of the component HTTP Handler. The manipulation leads to path traversal. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Title Tenda i9 HTTP R7WebsSecurityHandlerfunction path traversal
First Time appeared Tenda
Tenda i9 Firmware
Weaknesses CWE-22
CPEs cpe:2.3:o:tenda:i9_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda i9 Firmware
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:31:32.640Z

Reserved: 2026-04-25T15:37:57.608Z

Link: CVE-2026-7036

cve-icon Vulnrichment

Updated: 2026-04-27T13:12:55.202Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T12:16:22.987

Modified: 2026-04-30T14:10:26.873

Link: CVE-2026-7036

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T13:30:32Z

Weaknesses