Description
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
Published: 2026-04-10
Score: 9.3 Critical
EPSS: 1.2% Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The flaw lies in the setLoginPasswordCfg handler of the router’s CGI interface. The admpass parameter is not sanitized and is passed directly to the operating system shell, allowing an attacker to inject arbitrary commands. This remote command injection can lead to full compromise of the device, enabling the attacker to read or modify firmware, install backdoors, or disrupt network traffic.

Affected Systems

This vulnerability affects Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. The affected component is the CGI handler located at /cgi-bin/cstecgi.cgi. Other firmware releases containing the same code may also be vulnerable, but only this version has been confirmed.

Risk and Exploitability

The CVSS score of 9.3 denotes a critical severity. The exploit is publicly available and can be launched remotely through the web interface without authentication, simply by manipulating the admpass parameter. EPSS data is not available, but the combination of a high severity score and public exploit suggests a high likelihood of real‑world exploitation. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, yet the critical impact warrants immediate attention.

Generated by OpenCVE AI on April 10, 2026 at 02:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version released by Totolink that fixes the command‑injection flaw.
  • If a patch is unavailable, restrict remote access to the /cgi-bin/cstecgi.cgi URL or disable remote web management entirely; allow only local management.
  • Apply strong authentication and limits on remote management whenever possible.
  • Monitor for anomalous POST requests containing the admpass parameter and investigate suspicious activity.

Generated by OpenCVE AI on April 10, 2026 at 02:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Fri, 10 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
Title Totolink A7100RU CGI cstecgi.cgi setLoginPasswordCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T13:47:48.462Z

Reserved: 2026-04-09T12:49:20.578Z

Link: CVE-2026-5997

cve-icon Vulnrichment

Updated: 2026-04-10T13:47:44.991Z

cve-icon NVD

Status : Deferred

Published: 2026-04-10T02:16:04.247

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-5997

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:27:16Z

Weaknesses