Description
A flaw has been found in TOTOLINK A7000R up to 9.1.0u.6115. The affected element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument ssid5g causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Published: 2026-04-13
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is a stack‑based buffer overflow in the setWiFiEasyGuestCfg function of the /cgi‑bin/cstecgi.cgi script. Manipulating the ssid5g argument overflows a buffer on the stack, allowing an attacker to corrupt execution flow and execute arbitrary code. The description states that remote exploitation is possible and that a public exploit exists.

Affected Systems

Affected devices are TOTOLINK A7000R routers running firmware versions up to 9.1.0u.6115. Any unit with an older firmware that has not been updated can be targeted.

Risk and Exploitability

The CVSS score is 8.7, indicating a high severity. EPSS is not provided, and the vulnerability is not currently listed in CISA’s KEV catalog. Based on the description, the likely attack vector is remote, via the router’s web interface or CGI endpoint, and does not require local access. Since a published exploit exists, the risk to exposed devices is significant.

Generated by OpenCVE AI on April 13, 2026 at 08:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the latest firmware that fixes the stack‑based overflow in setWiFiEasyGuestCfg.
  • If an update is not yet available, block external access to /cgi‑bin/cstecgi.cgi from untrusted networks or limit the router’s management interface to a trusted internal network.
  • Monitor device logs for signs of exploitation attempts and consider disabling the Wi‑Fi Easy Guest configuration feature if no update can be applied.

Generated by OpenCVE AI on April 13, 2026 at 08:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7000r
Vendors & Products Totolink a7000r

Mon, 13 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in TOTOLINK A7000R up to 9.1.0u.6115. The affected element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument ssid5g causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Title TOTOLINK A7000R cstecgi.cgi setWiFiEasyGuestCfg stack-based overflow
First Time appeared Totolink
Totolink a7000r Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:totolink:a7000r_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7000r Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7000r A7000r Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T06:30:14.050Z

Reserved: 2026-04-12T20:49:43.517Z

Link: CVE-2026-6168

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-13T07:16:51.283

Modified: 2026-04-13T15:01:43.663

Link: CVE-2026-6168

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:52:41Z

Weaknesses