Description
A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setSyslogCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument enable leads to os command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Published: 2026-04-10
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS Command Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to supply crafted input to the setSyslogCfg function within the /cgi-bin/cstecgi.cgi handler, which the firmware forwards directly to the underlying operating system shell. This leads to arbitrary command execution on the router. The weakness is an input validation failure that fails to neutralize shell metacharacters, categorized as command injection. An attacker who succeeds can gain full control of the device, compromising confidentiality, integrity, and availability of the network it serves.

Affected Systems

Devices affected are Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. The flaw exists in the CGI Handler component exposed via the HTTP/HTTPS interface and does not appear to affect other firmware branches or products, though any device sharing the same CGI code base may be vulnerable if not updated.

Risk and Exploitability

With a CVSS base score of 9.3, this flaw is considered critical. The EPSS score is not published, and the vulnerability is not listed in the CISA KEV catalog, yet public exploit scripts exist, indicating that attackers can readily target exposed devices. The most likely attack vector is remote: an adversary only needs to send a specially crafted HTTP request to the cstecgi.cgi endpoint, assuming no network segmentation or access controls block the traffic.

Generated by OpenCVE AI on April 10, 2026 at 06:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update released by Totolink for the A7100RU that addresses this command injection flaw.
  • If a patch is not yet available, restrict or block inbound HTTP/HTTPS traffic to the router by applying firewall rules or by placing the device in a secure internal subnet that is not directly reachable from the Internet.
  • If possible, disable or limit access to the /cgi-bin/cstecgi.cgi endpoint so that only trusted IP addresses can invoke it.

Generated by OpenCVE AI on April 10, 2026 at 06:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Fri, 10 Apr 2026 05:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setSyslogCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument enable leads to os command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Title Totolink A7100RU CGI cstecgi.cgi setSyslogCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T14:59:13.478Z

Reserved: 2026-04-09T15:55:16.991Z

Link: CVE-2026-6025

cve-icon Vulnrichment

Updated: 2026-04-10T14:59:06.581Z

cve-icon NVD

Status : Received

Published: 2026-04-10T06:16:07.203

Modified: 2026-04-10T06:16:07.203

Link: CVE-2026-6025

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:40Z

Weaknesses