Description
A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function UploadOpenVpnCert of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-04-13
Score: 9.3 Critical
EPSS: 1.2% Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in the UploadOpenVpnCert function of /cgi-bin/cstecgi.cgi. Manipulating the FileName parameter allows injection of arbitrary OS commands, leading to remote code execution on the router firmware and compromising confidentiality, integrity, and availability of the device and connected networks. This weakness corresponds to command injection.

Affected Systems

Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024 are affected; no other versions are listed. Devices exposing the /cgi-bin/cstecgi.cgi endpoint over the network are at risk.

Risk and Exploitability

The CVSS score of 9.3 indicates critical severity. EPSS data is not available, but the vulnerability is publicly disclosed and can be exploited remotely without authentication. The CVE is not listed in the CISA KEV catalog, yet the combination of high CVSS and exposed command injection makes it a high-priority threat. Attackers can send crafted HTTP requests from anywhere on the network to execute arbitrary commands on the device.

Generated by OpenCVE AI on April 13, 2026 at 02:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to the latest available version that removes the vulnerable code.
  • If a firmware update is not possible, block or restrict access to /cgi-bin/cstecgi.cgi via firewall or router ACLs.
  • Revoke unused administrative accounts and enforce strong passwords.
  • Segment the network and isolate the router from untrusted segments.
  • Monitor logs and network traffic for suspicious command execution attempts.

Generated by OpenCVE AI on April 13, 2026 at 02:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Mon, 13 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function UploadOpenVpnCert of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Title Totolink A7100RU CGI cstecgi.cgi UploadOpenVpnCert os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-14T19:37:43.658Z

Reserved: 2026-04-12T07:27:28.685Z

Link: CVE-2026-6139

cve-icon Vulnrichment

Updated: 2026-04-14T19:35:52.895Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T01:16:35.500

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-6139

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:49Z

Weaknesses