Description
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTtyServiceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument ttyEnable leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-12
Score: 9.3 Critical
EPSS: 1.2% Low
KEV: No
Impact: Operating System Command Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the setTtyServiceCfg function of the /cgi-bin/cstecgi.cgi CGI handler on the router. By manipulating the ttyEnable argument, an attacker can inject arbitrary operating system commands, enabling execution of code outside the normal application context. This level of control allows complete compromise of the device’s confidentiality, integrity, and availability.

Affected Systems

Only Totolink A7100RU routers with firmware 7.4cu.2313_b20191024 are listed as impacted. No other vendors or product lines appear to be affected by this flaw.

Risk and Exploitability

With a CVSS score of 9.3 the issue is classified as Critical. EPSS information is not provided, but the exploit has been publicly disclosed and can be triggered remotely via the CGI endpoint. The vulnerability is not currently listed in CISA’s KEV catalog; nevertheless the combination of high severity and public exploitation make it a high‑risk threat.

Generated by OpenCVE AI on April 12, 2026 at 06:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact Totolink to obtain an official firmware update that addresses the command injection issue.
  • If no patch is immediately available, block external access to the /cgi-bin/cstecgi.cgi endpoint or limit it to trusted internal networks.
  • Configure network segmentation and apply firewall rules to restrict management traffic to authorized devices.
  • Enable logging of CGI requests and monitor logs for anomalous command execution patterns or repeated access attempts.

Generated by OpenCVE AI on April 12, 2026 at 06:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Sun, 12 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTtyServiceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument ttyEnable leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
Title Totolink A7100RU CGI cstecgi.cgi setTtyServiceCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-14T13:58:57.661Z

Reserved: 2026-04-11T08:18:05.414Z

Link: CVE-2026-6113

cve-icon Vulnrichment

Updated: 2026-04-14T13:58:51.206Z

cve-icon NVD

Status : Deferred

Published: 2026-04-12T04:16:49.037

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-6113

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:21Z

Weaknesses