A weakness has been identified in Tenda i3 1.0.0.6(2204). The affected element is the function R7WebsSecurityHandler of the component HTTP Handler. Executing a manipulation can lead to path traversal. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
References
| Link | Resource |
|---|---|
| https://github.com/MrXiaoFan/TendaVul/tree/main/tenda-i3-V1.0.0.6(2204)-R7WebsSecurityHandler-Authentication%20Bypass%20Issues | Exploit Third Party Advisory |
| https://vuldb.com/submit/789935 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/356297 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/356297/cti | Permissions Required VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Apr 2026, 15:47
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Tenda
Tenda i3 Tenda i3 Firmware |
|
| CPE | cpe:2.3:o:tenda:i3_firmware:1.0.0.6\(2204\):*:*:*:*:*:*:* cpe:2.3:h:tenda:i3:-:*:*:*:*:*:*:* |
|
| References | () https://github.com/MrXiaoFan/TendaVul/tree/main/tenda-i3-V1.0.0.6(2204)-R7WebsSecurityHandler-Authentication%20Bypass%20Issues - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/submit/789935 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/356297 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/356297/cti - Permissions Required, VDB Entry | |
| References | () https://www.tenda.com.cn/ - Product |
09 Apr 2026, 05:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 05:16
Updated : 2026-04-30 15:47
NVD link : CVE-2026-5841
Mitre link : CVE-2026-5841
CVE.ORG link : CVE-2026-5841
JSON object : View
Products Affected
tenda
- i3
- i3_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
