Description
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setWiFiBasicCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument wifiOff can lead to os command injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-09
Score: 9.3 Critical
EPSS: 1.3% Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the setWiFiBasicCfg function of the /cgi-bin/cstecgi.cgi CGI handler on Totolink A7100RU firmware 7.4cu.2313_b20191024. The attacker can supply a crafted value for the wifiOff parameter, which is passed directly to an operating‑system command line. This leads to an os command injection that results in remote code execution. The weakness is defined by CWE‑77 and CWE‑78.

Affected Systems

Vendors affected include Totolink. The product impacted is the A7100RU router running firmware version 7.4cu.2313_b20191024. All devices that have not applied the vendor’s firmware update are susceptible.

Risk and Exploitability

The CVSS base score of 9.3 indicates critical severity, and the vulnerability has a known public exploit available. Although an EPSS score is not provided, the presence of a public exploit and the ability to trigger the injection remotely mean that the attack is likely to be attempted. The vulnerability is not currently listed in the CISA KEV catalog, but the risk remains high because it can allow attackers to gain full control over the device.

Generated by OpenCVE AI on April 9, 2026 at 22:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update or patch released by Totolink for the A7100RU that addresses the cstecgi.cgi issue.
  • If no update is available, block external access to the device’s web administration interface by configuring the router’s firewall or placing the device in a separate network segment.
  • Change the default administrator credentials and disable remote management features.
  • Monitor the router logs for unusual CGI activity and consider disabling the setWiFiBasicCfg option if possible.

Generated by OpenCVE AI on April 9, 2026 at 22:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Thu, 09 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setWiFiBasicCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument wifiOff can lead to os command injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
Title Totolink A7100RU CGI cstecgi.cgi setWiFiBasicCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-14T14:48:40.525Z

Reserved: 2026-04-09T12:11:47.004Z

Link: CVE-2026-5977

cve-icon Vulnrichment

Updated: 2026-04-14T14:48:35.263Z

cve-icon NVD

Status : Deferred

Published: 2026-04-09T21:16:13.487

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-5977

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:29:20Z

Weaknesses