Description
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setIpQosRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument Comment leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
Published: 2026-04-13
Score: 9.3 Critical
EPSS: 1.2% Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the setIpQosRules function of the cstecgi.cgi CGI script on Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. An attacker can manipulate the Comment parameter to inject arbitrary operating‑system commands, resulting in remote code execution. This flaw corresponds to the OS Command Injection weaknesses identified as CWE‑77 and CWE‑78.

Affected Systems

Affected devices are Totolink A7100RU routers supplied with the specified firmware build. No other vendors or product lines are mentioned in the advisory, and the issue is limited to the CGI handler component of the router firmware.

Risk and Exploitability

The CVSS base score of 9.3 reflects critical severity. The EPSS score is unavailable. The CISA KEV catalog does not list this entry, indicating no known exploitation at the time of disclosure. The likely attack vector is remote exposure of the CGI endpoint via the router's web interface or other network paths that allow HTTP requests. Successful exploitation would give an attacker administrative control over the router, compromising network traffic confidentiality, integrity, and availability.

Generated by OpenCVE AI on April 13, 2026 at 05:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware upgrade from Totolink that includes a patch for the cstecgi.cgi issue.
  • If a firmware update is not immediately available, block external access to the /cgi-bin/cstecgi.cgi endpoint using firewall rules or disable remote management features entirely.
  • Implement monitoring of web access logs for requests to the cstecgi.cgi endpoint and investigate any suspicious activity.

Generated by OpenCVE AI on April 13, 2026 at 05:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Mon, 13 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setIpQosRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument Comment leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
Title Totolink A7100RU CGI cstecgi.cgi setIpQosRules os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T19:14:15.425Z

Reserved: 2026-04-12T18:06:05.971Z

Link: CVE-2026-6156

cve-icon Vulnrichment

Updated: 2026-04-13T19:14:12.128Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T04:16:15.450

Modified: 2026-04-27T19:05:57.310

Link: CVE-2026-6156

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:33Z

Weaknesses