Description
A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setAccessDeviceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mac causes os command injection. The attack can be initiated remotely. The exploit has been published and may be used.
Published: 2026-04-13
Score: 9.3 Critical
EPSS: 1.2% Low
KEV: No
Impact: Remote OS Command Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerable function setAccessDeviceCfg in the CGI handler cstecgi.cgi accepts a mac argument that is directly used in an operating‑system command context. Manipulating this parameter allows an attacker to inject arbitrary shell commands, resulting in full remote code execution. This flaw is classified as a high‑severity vulnerability and maps to command injection weaknesses.

Affected Systems

The vulnerability affects the Totolink A7100RU router running firmware 7.4cu.2313_b20191024. Any device running this firmware with the cstecgi.cgi endpoint exposed to the internet is susceptible.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.3, indicating critical severity. The attack vector is remote and an exploit has already been published, increasing the likelihood of real‑world exploitation. The EPSS score is not available, and the issue is not listed in the Known Exploited Vulnerabilities catalog, but the public availability of a working exploit warrants urgent attention.

Generated by OpenCVE AI on April 13, 2026 at 01:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Totolink that removes or secures the vulnerable cgi endpoint.
  • If a firmware upgrade cannot be performed immediately, isolate the router from external networks or block access to the /cgi-bin/cstecgi.cgi path for untrusted IP addresses.
  • Disable remote management features or remove the cstecgi.cgi handler if the router allows it, as a temporary protective measure.
  • Verify that the mac parameter is properly sanitized and that command injection is no longer possible after remediation.

Generated by OpenCVE AI on April 13, 2026 at 01:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Mon, 13 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setAccessDeviceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mac causes os command injection. The attack can be initiated remotely. The exploit has been published and may be used.
Title Totolink A7100RU CGI cstecgi.cgi setAccessDeviceCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T12:01:48.897Z

Reserved: 2026-04-12T07:27:20.729Z

Link: CVE-2026-6138

cve-icon Vulnrichment

Updated: 2026-04-13T12:01:34.217Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T00:16:21.493

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-6138

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:49Z

Weaknesses