Description
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-10
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A security flaw exists in the setPptpServerCfg CGI on Totolink A7100RU routers. The ‘enable’ argument is improperly validated, making it possible for an unauthenticated attacker to inject arbitrary operating‑system commands. The flaw is a typical command injection vulnerability, classified under CWE‑77 and CWE‑78.

Affected Systems

The affected devices are Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. Only the specific version listed in the vulnerability report is confirmed, but any device exposing the /cgi-bin/cstecgi.cgi endpoint could be vulnerable if the same code path remains.

Risk and Exploitability

The CVSS base score of 9.3 indicates a high‑severity, remote exploitation possibility. Because the exploit is publicly disclosed and can be triggered over the network with a crafted HTTP request, the risk is significant. While the EPSS score is not provided and the vulnerability is not yet in the KEV catalog, the combination of remote reachability and uncontrolled command execution makes mitigation a priority. Exploits do not require authentication and can be performed from any host that can reach the router’s management interface.

Generated by OpenCVE AI on April 10, 2026 at 08:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to the latest firmware provided by Totolink that removes or patches the vulnerable CGI script.
  • If an upgrade is not immediately possible, block or restrict HTTP access to the /cgi-bin/cstecgi.cgi endpoint using firewall or ACL rules.
  • Disable the PPTP server configuration capability on the router or limit access to trusted administrative users only.
  • Regularly review device logs for anomalous injected‑command attempts and monitor for unexpected system command execution.
  • Check the Totolink security advisories page for any interim patches or workarounds and apply them as soon as they are released.

Generated by OpenCVE AI on April 10, 2026 at 08:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Fri, 10 Apr 2026 07:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Title Totolink A7100RU CGI cstecgi.cgi setPptpServerCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T13:39:19.307Z

Reserved: 2026-04-09T15:55:26.694Z

Link: CVE-2026-6028

cve-icon Vulnrichment

Updated: 2026-04-10T13:39:16.014Z

cve-icon NVD

Status : Received

Published: 2026-04-10T07:16:21.790

Modified: 2026-04-10T07:16:21.790

Link: CVE-2026-6028

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:34Z

Weaknesses