Description
A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setAppCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument enable can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used.
Published: 2026-04-12
Score: 9.3 Critical
EPSS: 1.3% Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The flaw is an OS command injection vulnerability that resides in the setAppCfg function of the cstecgi.cgi CGI handler. An attacker can manipulate the enable parameter to cause the router to execute arbitrary system commands, which results in full remote code execution and complete takeover of the device. This weakness corresponds to command injection (CWE‑77) and operating‑system command injection (CWE‑78).

Affected Systems

The vulnerability affects Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. No other firmware releases are documented as impacted, and no additional vendors or product lines appear to be affected in the advisory.

Risk and Exploitability

The vulnerability has a CVSS base score of 9.3, indicating critical severity. It can be exploited remotely over the network by sending a malicious enable parameter value to /cgi-bin/cstecgi.cgi. An exploit has already been published and demonstrated, meaning the flaw is actively used by threat actors. While the EPSS score is not available, the high CVSS, public exploit, and lack of privilege restrictions make the risk considerable. The vulnerability is not yet listed in the CISA KEV catalog, but that does not lessen the urgency of remediation.

Generated by OpenCVE AI on April 12, 2026 at 06:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the latest firmware update for the A7100RU that addresses the cstecgi.cgi vulnerability.
  • If an updated firmware release is not yet available, restrict remote HTTP access to the /cgi-bin/cstecgi.cgi endpoint by configuring firewall or router access control lists so that only trusted management networks can reach it.
  • Monitor router logs for unexpected usage of the enable parameter or signs of anomalous command execution.
  • Apply general network hardening measures such as disabling remote web management when not needed and keeping the firmware up‑to‑date.

Generated by OpenCVE AI on April 12, 2026 at 06:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Sun, 12 Apr 2026 05:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setAppCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument enable can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used.
Title Totolink A7100RU CGI cstecgi.cgi setAppCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T17:50:25.532Z

Reserved: 2026-04-11T08:18:11.570Z

Link: CVE-2026-6115

cve-icon Vulnrichment

Updated: 2026-04-13T17:50:21.941Z

cve-icon NVD

Status : Deferred

Published: 2026-04-12T05:16:00.807

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-6115

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:19Z

Weaknesses