Platform
tenda
Component
tenda
Fixed in
1.0.1
CVE-2026-5849 describes a Path Traversal vulnerability discovered in the Tenda i12 router, specifically affecting versions 1.0.0 through 1.0.0.11(3862). This vulnerability allows attackers to potentially access sensitive files and directories on the device. The vulnerability has been publicly disclosed, increasing the risk of exploitation. Mitigation strategies include upgrading to a patched firmware version, implementing network segmentation, and deploying Web Application Firewall (WAF) rules.
The Path Traversal vulnerability in Tenda i12 allows an attacker to bypass access controls and retrieve arbitrary files from the device's file system. This could include configuration files containing sensitive credentials (usernames, passwords, API keys), firmware images, or other proprietary data. Successful exploitation could lead to complete compromise of the router, enabling attackers to modify settings, intercept network traffic, or use the device as a pivot point to attack other systems on the network. The public disclosure of this vulnerability significantly increases the likelihood of exploitation, particularly given the router's common use in home and small business networks.
CVE-2026-5849 has been publicly disclosed, indicating a higher probability of exploitation. While no specific exploit details are publicly available beyond the disclosure itself, the ease of path traversal exploitation often leads to rapid development of proof-of-concept tools. The vulnerability was added to the NVD on 2026-04-09. EPSS score is pending evaluation, but the public disclosure suggests a medium to high probability of exploitation.
Exploit Status
EPSS
0.08% (24% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-5849 is to upgrade the Tenda i12 router to a firmware version that addresses the vulnerability. Check the Tenda support website for the latest firmware release. If upgrading is not immediately possible due to compatibility issues or device limitations, consider implementing temporary workarounds. These include segmenting the router from critical network resources using firewalls or VLANs, and deploying a Web Application Firewall (WAF) with rules to block attempts to access unauthorized files. Monitor router logs for suspicious activity, such as unusual file access attempts. After upgrading, verify the fix by attempting to access a restricted file via a path traversal request; the request should be denied.
Update the firmware of the Tenda i12 device to a version corrected by the manufacturer. Consult the official Tenda website or contact technical support for more information about available updates.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-5849 is a Path Traversal vulnerability affecting Tenda i12 routers, allowing attackers to access unauthorized files. It has a CVSS score of 7.3 (HIGH).
You are affected if you are using a Tenda i12 router running versions 1.0.0–1.0.0.11(3862).
Upgrade your Tenda i12 router to the latest firmware version available from the Tenda support website. Implement temporary mitigations like network segmentation and WAF rules if immediate upgrade is not possible.
The vulnerability has been publicly disclosed, increasing the likelihood of exploitation. Active exploitation has not been confirmed, but is possible.
Check the Tenda support website for advisories related to CVE-2026-5849. The NVD entry (https://nvd.nist.gov/vuln/detail/CVE-2026-5849) may also contain links to vendor advisories.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.