Description
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setNtpCfg of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument tz results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: 1.2% Low
KEV: No
Impact: Remote code execution via OS command injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in the setNtpCfg function of Totolink A7100RU firmware 7.4cu.2313_b20191024, where manipulating the tz argument in /cgi-bin/cstecgi.cgi allows an attacker to inject arbitrary operating‑system commands. This results in remote code execution, giving an attacker the ability to read, modify or delete data, disrupt service, or use the device as a foothold for further attacks. The weakness is a classic OS command injection, as noted by the related CWE identifiers.

Affected Systems

Totolink routers with the A7100RU model running firmware version 7.4cu.2313_b20191024. No other products or firmware versions are explicitly listed as affected.

Risk and Exploitability

The CVSS score of 6.9 reflects a moderate severity, and the vulnerability is not listed in KEV, though the exploit is publicly available. The EPSS score of 1% indicates a very low but non‑zero probability of exploitation, yet the publicly available exploit and lack of authentication make the risk significant when the device is reachable. Because the flaw is accessed through a web‑based CGI endpoint, any user with network reachability to the device can exploit it without authentication. If the router is exposed to the Internet or the local network is not properly segmented, the risk of exploitation is high. Mitigation requires either applying the vendor’s firmware update or restricting network access to the vulnerable endpoint.

Generated by OpenCVE AI on April 22, 2026 at 03:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the A7100RU firmware to the latest version released by Totolink that resolves the command injection flaw.
  • If a firmware update is not immediately available, block external access to the /cgi-bin/cstecgi.cgi endpoint or configure the router to allow access only from trusted internal networks.
  • Disable NTP configuration or the setNtpCfg function if possible to eliminate the attack surface.
  • Monitor router logs for unexpected command execution attempts and verify that the vulnerability cannot be triggered from the network.

Generated by OpenCVE AI on April 22, 2026 at 03:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setNtpCfg of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument tz results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
Title Totolink A7100RU cstecgi.cgi setNtpCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T13:28:13.122Z

Reserved: 2026-04-06T10:26:59.348Z

Link: CVE-2026-5689

cve-icon Vulnrichment

Updated: 2026-04-07T13:28:09.245Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T23:16:30.683

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5689

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T03:45:06Z

Weaknesses