Description
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument User results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.
Published: 2026-04-10
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

An OS command injection vulnerability exists in the setVpnAccountCfg function of the cstecgi.cgi CGI handler on the Totolink A7100RU router. An attacker can supply a specially crafted User parameter that allows arbitrary OS command execution on the router, potentially compromising its operating system and enabling full control over the device, including manipulation of network traffic, data exfiltration, and denial of service.

Affected Systems

The vulnerability affects the Totolink A7100RU router, specifically firmware version 7.4cu.2313_b20191024. Any device running this firmware edition is susceptible to remote exploitation.

Risk and Exploitability

The flaw carries a CVSS score of 9.3, indicating critical severity. No EPSS score is provided, but the exploit is publicly known and actively used, and the vulnerability is not yet listed in the CISA KEV catalog. Attackers can reach the target remotely through the router’s publicly exposed management interface, likely without authentication, making it highly exploitable.

Generated by OpenCVE AI on April 10, 2026 at 08:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version that resolves the setVpnAccountCfg command injection.
  • If a firmware update is unavailable, restrict external access to the device’s web management interface or apply firewall rules to block traffic to the /cgi-bin/cstecgi.cgi path from untrusted networks.
  • Disable or block the CGI handler for cstecgi.cgi if configuration allows, or isolate the device from the internet and monitor for suspicious requests.

Generated by OpenCVE AI on April 10, 2026 at 08:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Fri, 10 Apr 2026 07:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument User results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.
Title Totolink A7100RU CGI cstecgi.cgi setVpnAccountCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T15:45:55.950Z

Reserved: 2026-04-09T15:55:29.603Z

Link: CVE-2026-6029

cve-icon Vulnrichment

Updated: 2026-04-10T15:45:49.133Z

cve-icon NVD

Status : Received

Published: 2026-04-10T07:16:22.000

Modified: 2026-04-10T07:16:22.000

Link: CVE-2026-6029

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:32Z

Weaknesses