Description
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument maxRtrAdvInterval causes os command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-12
Score: 9.3 Critical
EPSS: 1.3% Low
KEV: No
Impact: Remote OS command execution via CGI command injection
Action: Patch immediately
AI Analysis

Impact

The vulnerability allows an attacker to inject arbitrary operating system commands through the maxRtrAdvInterval parameter of the setRadvdCfg function in the cstecgi.cgi CGI handler. This results in remote OS command execution and full compromise of the affected router, providing attackers with control over the device and any connected networks. The weakness is consistent with common command injection flaws.

Affected Systems

Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024 are affected. No other versions or products are listed as vulnerable in the available data.

Risk and Exploitability

The vulnerability scores a CVSS of 9.3, indicating critical severity, and the exploit is publicly available, implying a high likelihood of exploitation. EPSS data is not provided, and the flaw is not yet listed in the CISA KEV catalog. Attackers can initiate the exploit remotely, and successful exploitation leads to complete loss of confidentiality, integrity, and availability of the device.

Generated by OpenCVE AI on April 12, 2026 at 05:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the router firmware version; if it matches 7.4cu.2313_b20191024, update the device to the latest firmware released by Totolink that fixes the command injection flaw. If a patch is not yet available, disable the cstecgi.cgi endpoint or block external access to the port hosting the CGI interface. Monitor the router and network logs for suspicious activity and consider network segmentation to limit exposure.

Generated by OpenCVE AI on April 12, 2026 at 05:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Sun, 12 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument maxRtrAdvInterval causes os command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Title Totolink A7100RU CGI cstecgi.cgi setRadvdCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-15T15:17:02.716Z

Reserved: 2026-04-11T08:17:59.227Z

Link: CVE-2026-6112

cve-icon Vulnrichment

Updated: 2026-04-15T15:16:58.437Z

cve-icon NVD

Status : Deferred

Published: 2026-04-12T04:16:47.133

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-6112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:22Z

Weaknesses