Description
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument wizard results in os command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-13
Score: 9.3 Critical
EPSS: 1.2% Low
KEV: No
Impact: Remote OS command injection
Action: Immediate Patch
AI Analysis

Impact

A flaw in the setWizardCfg function of the /cgi-bin/cstecgi.cgi component allows remote manipulation of the wizard argument to inject and execute arbitrary operating system commands. This leads to complete compromise of the device’s control plane, granting an attacker full administrative privileges. The weakness aligns with OS command injection problems documented as CWE‑77 and CWE‑78.

Affected Systems

All Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024 are affected. The vulnerability is specific to the CGI Handler element present in these devices.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.3, indicating critical severity. EPSS data is unavailable, and the vulnerability is not listed in CISA’s KEV catalog, but a public exploit has been released, suggesting the attack vector is remote and exploitable over the network. An attacker can simply send a crafted request to the affected endpoint to execute arbitrary commands, with no local privileges required.

Generated by OpenCVE AI on April 13, 2026 at 05:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Totolink that addresses the setWizardCfg injection flaw.
  • If a patch is not yet available, block or disable the /cgi-bin/cstecgi.cgi endpoint using the router’s firewall or access control settings.
  • Restrict external access to the router’s management interface and enforce strong authentication.
  • Monitor device logs for anomalous command execution patterns or unexpected use of the setWizardCfg interface.

Generated by OpenCVE AI on April 13, 2026 at 05:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Mon, 13 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument wizard results in os command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.
Title Totolink A7100RU CGI cstecgi.cgi setWizardCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T15:03:26.716Z

Reserved: 2026-04-12T18:05:57.820Z

Link: CVE-2026-6154

cve-icon Vulnrichment

Updated: 2026-04-13T15:03:23.845Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T04:16:14.993

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-6154

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:35Z

Weaknesses