Description
A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument ip leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Published: 2026-04-12
Score: 9.3 Critical
EPSS: 1.2% Low
KEV: No
Impact: Remote code execution via command injection
Action: Immediate patch
AI Analysis

Impact

The vulnerability resides in the setDiagnosisCfg function of /cgi-bin/cstecgi.cgi in Totolink A7100RU firmware 7.4cu.2313_b20191024 and allows an attacker to inject arbitrary OS commands by manipulating the ip argument. This leads to full control over the router, enabling configuration changes, installation of backdoors, or use of the device for further malicious activities. The weakness is identified as command injection (CWE-77) and operating system command execution (CWE-78).

Affected Systems

Only Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024 are known to be vulnerable. No other firmware builds are enumerated in the data, so verification is required for all devices.

Risk and Exploitability

The CVSS base score of 9.3 denotes a critical severity. Exploitation is remote through HTTP requests to the CGI script and publicly disclosed exploit code is available, raising the likelihood of real-world attacks. The EPSS score is not provided and the vulnerability is not listed in the CISA KEV catalog, but its public availability mandates rapid response.

Generated by OpenCVE AI on April 12, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Totolink firmware that fixes the command injection flaw; if no update is available,
  • Restrict external access to /cgi-bin/cstecgi.cgi, limiting it to trusted internal hosts only.
  • Disable remote management or CGI-based services that are not required.
  • Monitor logs for abnormal use of the ip parameter or unexpected command execution.
  • Isolate the device from critical networks until the issue is fully resolved.

Generated by OpenCVE AI on April 12, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Sun, 12 Apr 2026 05:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument ip leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Title Totolink A7100RU CGI cstecgi.cgi setDiagnosisCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T12:16:37.916Z

Reserved: 2026-04-11T08:18:14.840Z

Link: CVE-2026-6116

cve-icon Vulnrichment

Updated: 2026-04-13T12:16:33.361Z

cve-icon NVD

Status : Deferred

Published: 2026-04-12T05:16:01.060

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-6116

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:17Z

Weaknesses