Description
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-09
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS Command Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in Totolink A7100RU firmware 7.4cu.2313_b20191024 allows a remote attacker to inject arbitrary operating system commands by manipulating the "enable" parameter of the setUPnPCfg function in /cgi-bin/cstecgi.cgi. This flaw, identified as a classic OS command injection (CWE‑77/78), can be triggered over the network, enabling the attacker to execute any command with the privileges of the router’s internal processes, effectively compromising the device’s confidentiality, integrity, and availability.

Affected Systems

Affected devices include the Totolink A7100RU router — the specific firmware revision 7.4cu.2313_b20191024. The component in question is the CGI Handler accessible via /cgi-bin/cstecgi.cgi, and the vulnerability is tied to the enable argument within the setUPnPCfg function.

Risk and Exploitability

The CVSS base score of 9.3 indicates a severe risk. While EPSS data is not publicly available, the presence of public exploit code confirms that the vulnerability can be and has been used in the wild. The flaw is not listed in the CISA KEV catalog, but because the attack vector is remote, does not require authentication, and can be performed with a simple crafted HTTP request, the risk to exposed or unmanaged routers is significant.

Generated by OpenCVE AI on April 9, 2026 at 07:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update released by Totolink that addresses the CGI command injection flaw.
  • If an update is not yet available, disable UPnP functionality or restrict it to trusted internal networks.
  • Block or limit external access to /cgi-bin/cstecgi.cgi using firewall rules or network segmentation.
  • Monitor router logs for anomalous command executions and conduct regular security audits of network devices.

Generated by OpenCVE AI on April 9, 2026 at 07:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Thu, 09 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
Title Totolink A7100RU CGI cstecgi.cgi setUPnPCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-09T12:13:58.251Z

Reserved: 2026-04-08T19:19:56.874Z

Link: CVE-2026-5851

cve-icon Vulnrichment

Updated: 2026-04-09T12:13:54.755Z

cve-icon NVD

Status : Received

Published: 2026-04-09T06:16:23.807

Modified: 2026-04-09T06:16:23.807

Link: CVE-2026-5851

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:24:52Z

Weaknesses