CVE-2026-6024
Received Received - Intake
Path Traversal in Tenda i6 HTTP Handler Allows Remote Exploit

Publication date: 2026-04-10

Last updated on: 2026-04-30

Assigner: VulDB

Description
A vulnerability was determined in Tenda i6 1.0.0.7(2204). Affected by this issue is the function R7WebsSecurityHandlerfunction of the component HTTP Handler. This manipulation causes path traversal. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-10
Last Modified
2026-04-30
Generated
2026-05-07
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tenda i6_firmware 1.0.0.7(2204)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-6024 is a path traversal vulnerability in the Tenda i6 router running firmware version 1.0.0.7(2204). It affects the R7WebsSecurityHandler function of the HTTP Handler component. This function is supposed to restrict access to certain URLs by allowing only whitelisted URL prefixes. However, it does not properly validate the rest of the URL after the whitelisted prefix.

An attacker can craft a URL starting with a whitelisted prefix but including directory traversal sequences (like "../") to escape the restricted directory. For example, a request to "/public/../system_upgrade.asp" bypasses the whitelist check but accesses a sensitive administrative page.

This flaw allows an unauthenticated remote attacker to bypass login authentication and gain direct access to administrative interfaces and sensitive resources on the router.


How can this vulnerability impact me? :

This vulnerability allows an unauthenticated remote attacker to bypass authentication and gain full administrative access to the Tenda i6 router. With this access, the attacker can control and modify router settings, potentially compromising the security and functionality of the network.

Such unauthorized access can lead to network disruption, interception of network traffic, installation of malicious firmware, or other malicious activities that compromise the confidentiality, integrity, and availability of the network.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to access sensitive administrative pages on the Tenda i6 router using specially crafted HTTP requests that exploit the path traversal flaw.

For example, you can use curl or similar HTTP client tools to send a GET request with a path traversal sequence starting with a whitelisted prefix such as "/public/../system_upgrade.asp".

  • curl -v http://<router-ip>/public/../system_upgrade.asp
  • curl -v http://<router-ip>/lang/../system_upgrade.asp

If the response returns the administrative page content instead of redirecting to a login page (HTTP 302), it indicates the vulnerability is present.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated remote attackers to bypass authentication and gain full administrative access to the Tenda i6 router. This unauthorized access to administrative functions and sensitive resources could lead to exposure or manipulation of personal or sensitive data.

Such unauthorized access and potential data exposure may impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive information and mandate controls to prevent unauthorized access.

However, the provided information does not explicitly detail the direct effects on compliance with these standards.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-6024 vulnerability in the Tenda i6 router, immediate steps include restricting remote access to the router's HTTP interface to trusted networks only, such as local LAN, to prevent unauthenticated remote exploitation.

Additionally, monitor for any available firmware updates or patches from the vendor that address this path traversal and authentication bypass issue, and apply them as soon as possible.

As a temporary measure, consider disabling any unnecessary HTTP services or administrative interfaces exposed remotely until a fix is applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart