Description
A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru leads to os command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Published: 2026-04-09
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The flaw resides in the setVpnPassCfg function of the cstecgi.cgi component in Totolink A7100RU firmware 7.4cu.2313_b20191024. Manipulation of the pptpPassThru argument permits injection of arbitrary operating‑system commands, allowing an attacker to execute code with the privileges of the web server process. Because the vulnerability is an OS command injection (CWE‑77/78), it can compromise the confidentiality, integrity, or availability of the device and its network traffic, with the potential to take full control of the router.

Affected Systems

This vulnerability affects only the Totolink A7100RU router model. The specific firmware revision that is vulnerable is 7.4cu.2313_b20191024. No other product variants or vendors are listed, so the scope is limited to this router and firmware build.

Risk and Exploitability

The CVSS v3 score of 9.3 indicates a critical severity. Although no EPSS score is published, publicly available exploit code suggests a realistic chance of exploitation. The attack can be launched remotely through the router’s web interface without local access or elevated privileges, enabling an attacker to run arbitrary commands on the host. The flaw is not currently in the CISA KEV catalog, but the combination of high severity and available exploits warrants urgent attention.

Generated by OpenCVE AI on April 9, 2026 at 07:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware patch provided by Totolink that fixes the setVpnPassCfg command injection issue
  • Verify the firmware checksum after download to avoid tampering
  • Consider isolating the router from critical internal networks until the patch is applied

Generated by OpenCVE AI on April 9, 2026 at 07:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Thu, 09 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru leads to os command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Title Totolink A7100RU CGI cstecgi.cgi setVpnPassCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-09T05:45:12.796Z

Reserved: 2026-04-08T19:19:52.962Z

Link: CVE-2026-5850

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T06:16:23.600

Modified: 2026-04-09T06:16:23.600

Link: CVE-2026-5850

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:24:53Z

Weaknesses