CVE-2026-5027 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 30, 2026
Application - Path Traversal
Overview
The application contains a path traversal vulnerability caused by unsanitized 'filename' parameter in the 'POST /api/v2/files' multipart form data, letting attackers write files to arbitrary filesystem locations, exploit requires crafted request.
Severity & Score
Impact
Attackers can write files to arbitrary locations, potentially leading to system compromise or data tampering.
Mitigation
Sanitize the 'filename' parameter to prevent path traversal or update to the latest secure version.
Social Media Activity(1 post)
š CVE-2026-5027 - High (8.8) The 'POST /api/v2/files' endpoint does not sanitize the 'filename' parameter from the multipart form data, allowing an attacker to write files to arbitrary locations on the filesystem using path traversal sequences ('../'). š https://www.thehackerwire.com/vulnerability/CVE-2026-5027/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-5027
- Severity
- High
- CVSS Score
- 8.8
- Type
- path_traversal
- Status
- unconfirmed
- EPSS
- 5.4%
- Social Posts
- 1
CWE
- CWE-22
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H