Description
A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument FileName results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.
Published: 2026-04-13
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS command injection enabling arbitrary code execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the UploadFirmwareFile routine of the cstecgi.cgi CGI handler on the router’s web interface. By manipulating the FileName argument, an attacker can inject operating‑system commands that are subsequently executed by the device’s firmware. This flaw permits remote execution of arbitrary code, allowing a threat actor to compromise the router’s confidentiality, integrity and availability.

Affected Systems

Routers of the Totolink A7100RU series running firmware version 7.4cu.2313_b20191024 are affected. The flaw is located in the /cgi-bin/cstecgi.cgi file that processes firmware uploads.

Risk and Exploitability

The CVSS score of 9.3 indicates a high‑severity vulnerability. EPSS data is not available, but the public availability of an exploit and the lack of existing mitigations make the risk significant. The attack vector is remote, leveraging the publicly accessible web interface without authentication, so an adversary can trigger the vulnerability from an external network. If exploited, the attacker gains full control of the device.

Generated by OpenCVE AI on April 13, 2026 at 02:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to the latest firmware released by Totolink that fixes the cstecgi.cgi command injection.
  • If an update is not available, restrict access to the /cgi-bin/cstecgi.cgi endpoint by whitelisting trusted IP addresses or applying firewall rules.
  • If the firmware upload feature is not required, disable it through the router’s configuration or isolate the device from untrusted networks.

Generated by OpenCVE AI on April 13, 2026 at 02:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Mon, 13 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument FileName results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.
Title Totolink A7100RU CGI cstecgi.cgi UploadFirmwareFile os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T15:19:43.693Z

Reserved: 2026-04-12T07:27:31.817Z

Link: CVE-2026-6140

cve-icon Vulnrichment

Updated: 2026-04-13T15:19:39.755Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T01:16:35.697

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-6140

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:48Z

Weaknesses