Description
A weakness has been identified in Totolink A7000R 4.1cu.4154. The impacted element is the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument FileName can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-01-29
Score: 5.3 Medium
EPSS: 5.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A weakness in the setUploadUserData function of Totolink A7000R’s cstecgi.cgi allows an attacker to inject arbitrary commands via the FileName argument. This leads to execution of malicious code on the device, potentially granting full control over the router and enabling further compromise of the network.

Affected Systems

The vulnerability affects Totolink A7000R models running firmware version 4.1cu.4154.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, while an EPSS score of 6% shows that the vulnerability is considered likely to be exploited. The flaw is not listed in the CISA KEV catalog, but a publicly available exploit demonstrates that remote attackers can leverage it from outside the local network. The attack path requires an HTTP request to the vulnerable CGI script; however, whether authentication is required is not explicitly confirmed in the available data, making it a significant risk for unmanaged routers exposed to the internet.

Generated by OpenCVE AI on May 3, 2026 at 14:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to a firmware version that includes the fix for the setUploadUserData command injection flaw.
  • If no update is immediately available, restrict external access to the /cgi-bin/cstecgi.cgi endpoint by applying firewall rules or disabling remote management features until a patch is applied.
  • Enable thorough logging on the device and monitor for anomalous command executions or unexpected changes in system behavior to detect potential exploitation attempts.

Generated by OpenCVE AI on May 3, 2026 at 14:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:totolink:a7000r_firmware:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7000r Firmware
CPEs cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:a7000r_firmware:4.1cu.4154:*:*:*:*:*:*:*
Vendors & Products Totolink a7000r Firmware

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a7000r
Vendors & Products Totolink
Totolink a7000r

Thu, 29 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 18:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Totolink A7000R 4.1cu.4154. The impacted element is the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument FileName can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Title Totolink A7000R cstecgi.cgi setUploadUserData command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7000r A7000r Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:06:35.690Z

Reserved: 2026-01-29T09:09:41.524Z

Link: CVE-2026-1601

cve-icon Vulnrichment

Updated: 2026-01-29T18:46:25.709Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T19:16:19.290

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1601

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-03T14:45:23Z

Weaknesses