Description
A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setFirewallType of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument firewallType leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: 4.7% Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the setFirewallType routine of the /cgi-bin/cstecgi.cgi script on Totolink A7100RU routers. Manipulating the firewallType parameter allows an attacker to inject arbitrary shell commands, leading to remote command execution on the device. This corresponds to the CWE-77 and CWE-78 weaknesses and enables an attacker to execute any commands with the privileges of the router’s operating system, potentially compromising network traffic, device configuration, and data confidentiality.

Affected Systems

Affected hardware is the Totolink A7100RU router running firmware 7.4cu.2313_b20191024. The vulnerability is documented for this specific firmware revision; no other versions are explicitly listed, but earlier or similar firmware may also be impacted unless patched.

Risk and Exploitability

The CVSS v3.1 score of 6.9 indicates a medium severity vulnerability. No EPSS score is available, and it is not listed in the CISA KEV catalog, but the attack can be carried out remotely as stated in the CVE description. Exploitation requires only sending a crafted request to the cstecgi.cgi endpoint; no advanced prerequisites are mentioned. Consequently, the risk is substantial for devices exposed to untrusted networks.

Generated by OpenCVE AI on April 7, 2026 at 01:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s support site and install the latest firmware that addresses the command injection issue.
  • If a patch is not yet available, restrict or disable remote access to the /cgi-bin/cstecgi.cgi endpoint or the firewall configuration API.
  • Isolate the router from untrusted networks by placing it behind a secure gateway or applying network segmentation.
  • Enable logging of CGI requests and monitor for abnormal parameter values that could indicate attempted exploitation.

Generated by OpenCVE AI on April 7, 2026 at 01:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setFirewallType of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument firewallType leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Title Totolink A7100RU cstecgi.cgi setFirewallType os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T16:24:28.803Z

Reserved: 2026-04-06T10:27:07.838Z

Link: CVE-2026-5691

cve-icon Vulnrichment

Updated: 2026-04-07T16:24:26.172Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T23:16:32.600

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5691

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:36:29Z

Weaknesses