Description
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setScheduleCfg of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument mode can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: 2.4% Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an OS command injection in the setScheduleCfg function of /cgi-bin/cstecgi.cgi on the Totolink A7100RU router. An attacker can craft the mode argument to cause the router to execute arbitrary shell commands, giving full control of the device. This allows compromise of confidentiality, integrity, and availability of the device and any connected network. The weakness aligns with CWE‑77 and CWE‑78.

Affected Systems

The flaw affects Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. The vendor and product details are confirmed in the CVE references. No other products or versions are listed.

Risk and Exploitability

The CVSS score of 6.9 denotes medium severity, and the exploit is publicly available, indicating a realistic risk of exploitation. EPSS information is not provided, but the public availability of the exploit suggests attackers could leverage it. The vulnerability is not flagged in the CISA KEV catalog. The attack can be executed remotely by sending a manipulated mode parameter to the vulnerable CGI endpoint.

Generated by OpenCVE AI on April 7, 2026 at 02:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify current firmware version and download the latest Totolink A7100RU firmware that fixes the command injection; apply the update immediately.
  • If no patch is available, block remote access to /cgi-bin/cstecgi.cgi or disable remote web administration on the router.
  • Change the router’s default administrator credentials to a strong, unique password.
  • Monitor device logs and network traffic for suspicious mode parameter usage, and review any unexpected CGI calls.
  • Reach out to Totolink support for further guidance and potential interim security measures.

Generated by OpenCVE AI on April 7, 2026 at 02:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setScheduleCfg of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument mode can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
Title Totolink A7100RU cstecgi.cgi setScheduleCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T14:05:26.633Z

Reserved: 2026-04-06T09:41:04.390Z

Link: CVE-2026-5678

cve-icon Vulnrichment

Updated: 2026-04-07T14:05:23.291Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T19:16:30.883

Modified: 2026-04-07T13:20:11.643

Link: CVE-2026-5678

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:45Z

Weaknesses