Description
A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setDmzCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument wanIdx leads to os command injection. The attack may be performed from remote. The exploit is publicly available and might be used.
Published: 2026-04-09
Score: 9.3 Critical
EPSS: 1.2% Low
KEV: No
Impact: Remote OS command injection
Action: Immediate Patch
AI Analysis

Impact

A remote attacker can inject operating‑system commands by manipulating the wanIdx parameter in the setDmzCfg function of /cgi-bin/cstecgi.cgi on a Totolink A7100RU router. This flaw is present in firmware version 7.4cu.2313_b20191024 and is characterized by CWE‑77 and CWE‑78 weaknesses. Successful exploitation would allow the attacker to run arbitrary OS commands on the device, potentially compromising the router’s functionality.

Affected Systems

The vulnerability affects Totolink A7100RU routers running firmware 7.4cu.2313_b20191024. No other manufacturers or product variants are listed, so users of this specific router model and firmware should verify whether their device is affected.

Risk and Exploitability

The issue carries a CVSS score of 9.3, indicating critical severity. The description states that the attack may be performed remotely and that a publicly available exploit exists. The exact requirements for exploitation, such as authentication or user roles, are not specified in the CVE data, so the likelihood of exploitation depends on the router’s external exposure. The vulnerability is not yet in the CISA KEV catalog, but its critical score and availability of exploits raise concern.

Generated by OpenCVE AI on April 9, 2026 at 21:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to the latest version released by Totolink.
  • If a firmware update is not immediately available, restrict or disable remote access to the router’s administrative interface to reduce exposure.
  • Block or filter external traffic targeting the /cgi-bin/cstecgi.cgi path until the vulnerability is addressed.
  • Monitor router logs for unusual command execution attempts or access to the affected CGI script.

Generated by OpenCVE AI on April 9, 2026 at 21:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Thu, 09 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setDmzCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument wanIdx leads to os command injection. The attack may be performed from remote. The exploit is publicly available and might be used.
Title Totolink A7100RU CGI cstecgi.cgi setDmzCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-09T20:10:54.661Z

Reserved: 2026-04-09T12:11:38.421Z

Link: CVE-2026-5975

cve-icon Vulnrichment

Updated: 2026-04-09T20:10:46.559Z

cve-icon NVD

Status : Deferred

Published: 2026-04-09T20:16:29.547

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-5975

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:29:26Z

Weaknesses