Tenda i3 1.0.0.6 HTTP Handler Path Traversal via R7WebsSecurityHandler Remote
CVE-2026-5841 Published on April 9, 2026
Tenda i3 HTTP R7WebsSecurityHandler path traversal
A weakness has been identified in Tenda i3 1.0.0.6(2204). The affected element is the function R7WebsSecurityHandler of the component HTTP Handler. Executing a manipulation can lead to path traversal. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
Timeline
Advisory disclosed
VulDB entry created
VulDB entry last update
Weakness Type
What is a Directory traversal Vulnerability?
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CVE-2026-5841 has been classified to as a Directory traversal vulnerability or weakness.
Products Associated with CVE-2026-5841
Want to know whenever a new CVE is published for Tenda I3 Firmware? stack.watch will email you.