A vulnerability was identified in Tenda i9 1.0.0.5(2204). This vulnerability affects the function R7WebsSecurityHandlerfunction of the component HTTP Handler. The manipulation leads to path traversal. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
History

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:i9:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:i9_firmware:1.0.0.5\(2204\):*:*:*:*:*:*:*

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda i9
Vendors & Products Tenda i9

Mon, 27 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda i9 1.0.0.5(2204). This vulnerability affects the function R7WebsSecurityHandlerfunction of the component HTTP Handler. The manipulation leads to path traversal. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Title Tenda i9 HTTP R7WebsSecurityHandlerfunction path traversal
First Time appeared Tenda
Tenda i9 Firmware
Weaknesses CWE-22
CPEs cpe:2.3:o:tenda:i9_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda i9 Firmware
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2026-04-26T11:30:14.570Z

Updated: 2026-04-27T13:31:32.640Z

Reserved: 2026-04-25T15:37:57.608Z

Link: CVE-2026-7036

cve-icon Vulnrichment

Updated: 2026-04-27T13:12:55.202Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-26T12:16:22.987

Modified: 2026-04-30T14:10:26.873

Link: CVE-2026-7036

cve-icon Redhat

No data.