Description
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setPortalConfWeChat of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument enable results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-10
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS Command Injection
Action: Immediate Patch
AI Analysis

Impact

The Totolink A7100RU router is vulnerable to an OS command injection flaw in the /cgi-bin/cstecgi.cgi CGI handler. By manipulating the enable argument of the setPortalConfWeChat function, an attacker can feed arbitrary shell commands into the device. Attackers can remotely trigger the flaw and execute code with the privileges of the router’s OS, leading to full compromise of the device, including disclosure of configuration, denial of service or further lateral movement. The flaw is critical, with a CVSS score of 9.3, indicating extreme severity.

Affected Systems

The vulnerability exists in firmware version 7.4cu.2313_b20191024 of the Totolink A7100RU wireless router. Users of that specific firmware revision are directly affected and should verify the firmware version they are running.

Risk and Exploitability

The attack vector is remote; the exploit code has been made publicly available, and the vulnerability has been assigned a very high CVSS score. No EPSS score is listed and the flaw is not yet in the CISA KEV catalog, but the public availability of exploit code means that the risk of exploitation is significant. An attacker who reaches the setPortalConfWeChat endpoint can readily deliver arbitrary commands for execution.

Generated by OpenCVE AI on April 10, 2026 at 07:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official firmware update released by Totolink that removes the command injection in cstecgi.cgi.
  • If an update is unavailable, restrict external access to the /cgi-bin/cstecgi.cgi endpoint using firewall rules or access control lists.
  • Implement network segmentation to isolate the router from critical infrastructure and limit potential lateral movement.
  • Monitor router logs for unusual usage of the enable parameter and monitor for signs of remote code execution attempts.

Generated by OpenCVE AI on April 10, 2026 at 07:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Fri, 10 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setPortalConfWeChat of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument enable results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
Title Totolink A7100RU CGI cstecgi.cgi setPortalConfWeChat os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T11:52:41.453Z

Reserved: 2026-04-09T15:55:20.704Z

Link: CVE-2026-6026

cve-icon Vulnrichment

Updated: 2026-04-10T11:52:36.213Z

cve-icon NVD

Status : Received

Published: 2026-04-10T07:16:21.350

Modified: 2026-04-10T07:16:21.350

Link: CVE-2026-6026

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:39Z

Weaknesses