Description
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument resetFlags results in os command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: 2.4% Low
KEV: No
Impact: Remote Code Execution via OS command injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an OS command injection flaw in the CsteSystem function of /cgi-bin/cstecgi.cgi on the Totolink A7100RU router. By manipulating the resetFlags argument, an attacker can execute arbitrary shell commands on the device, potentially taking full control or compromising network traffic. The flaw is exploitable remotely and has been publicly released.

Affected Systems

Totals affected: Totolink routers of the A7100RU model, specifically firmware version 7.4cu.2313_b20191024. The vulnerability originates in the cstecgi.cgi CGI script deployed on the device.

Risk and Exploitability

The CVSS score is 6.9, indicating moderate severity. The EPSS score is not available, but the exploit is publicly available and not listed in the CISA KEV catalog, suggesting a non-zero likelihood of real-world attacks. Because the flaw is a command injection in a CGI script, it can be triggered by sending a crafted HTTP request to the device from the local or Internet network, making the attack vector remote. The impact is full system compromise, and the ease of exploitation is high when the device accepts input from untrusted sources.

Generated by OpenCVE AI on April 7, 2026 at 02:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version provided by Totolink.
  • If an update is not yet available, block or restrict /cgi-bin/cstecgi.cgi via the device firewall or an external firewall.
  • Monitor router logs for unexpected command execution patterns.
  • Check the vendor’s website or security advisories for further patches or work‑arounds.

Generated by OpenCVE AI on April 7, 2026 at 02:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument resetFlags results in os command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.
Title Totolink A7100RU cstecgi.cgi CsteSystem os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T14:40:44.338Z

Reserved: 2026-04-06T09:38:55.422Z

Link: CVE-2026-5677

cve-icon Vulnrichment

Updated: 2026-04-07T14:40:40.329Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T19:16:30.680

Modified: 2026-04-07T13:20:11.643

Link: CVE-2026-5677

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:46Z

Weaknesses