VYPR
High severity7.3NVD Advisory· Published Apr 26, 2026· Updated Apr 30, 2026

CVE-2026-7036

CVE-2026-7036

Description

A vulnerability was identified in Tenda i9 1.0.0.5(2204). This vulnerability affects the function R7WebsSecurityHandlerfunction of the component HTTP Handler. The manipulation leads to path traversal. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated path traversal in Tenda i9's R7WebsSecurityHandler allows remote attackers to bypass authentication and access administrative pages.

Vulnerability

Analysis

The Tenda i9 router firmware V1.0.0.5(2204) contains a critical whitelist bypass vulnerability in the HTTP handler's R7WebsSecurityHandler function. This function is designed to authenticate all incoming HTTP requests by checking if the URL begins with whitelisted prefixes (such as /public/ or /lang/) using strncmp. However, the code does not perform any path canonicalization after the prefix check. [1]

Exploitation

An unauthenticated remote attacker can send a crafted HTTP GET request that starts with a whitelisted prefix (e.g., /public/) followed by directory traversal sequences (../) to escape the restricted directory and target sensitive backend files such as system_upgrade.asp. The PoC demonstrates that a request like GET /public/../system_upgrade.asp HTTP/1.1 bypasses the authentication check entirely and accesses administrative functions . [1]

Impact

Successful exploitation lets an unauthenticated attacker access administrative web administration panels and other restricted resources without credentials . This could lead to full device compromise, including changing settings, exfiltrating data, or using the router as a pivot point for further network attacks. [1]

Mitigation

As of the publication date (2026-04-26), no official patch has been announced by Tenda. The vendor's website [2] may provide firmware updates in the future, but currently the vulnerability remains unpatched. A proof-of-concept exploit is publicly available, increasing the risk of active exploitation. Users should consider restricting access to the router management interface or upgrading to a newer model if possible.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.