Description
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument admpass leads to os command injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-13
Score: 9.3 Critical
EPSS: 1.3% Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability lies in the setPasswordCfg function of the /cgi-bin/cstecgi.cgi CGI handler used by the Totolink A7100RU router. An attacker can manipulate the admpass argument to inject operating‑system commands, which the router then executes. Successful exploitation gives the attacker full control over the device, enabling arbitrary code execution, data exfiltration, or disruptive operations that could compromise confidentiality, integrity, and availability.

Affected Systems

Affected devices are Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. The flaw is present in the setPasswordCfg CGI script accessed remotely, so any router with this firmware is vulnerable.

Risk and Exploitability

The CVSS score of 9.3 classifies the issue as critical, and the exploit has been disclosed publicly with remote execution possible without specialized privileges. While an EPSS value is not provided, the lack of a KEV listing does not diminish the risk; attackers can leverage the flaw from any network that can reach the router’s management interface. As the attack vector is remote, the potential damage spans the entire device.

Generated by OpenCVE AI on April 13, 2026 at 18:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Totolink website or vendor support portal for a firmware update that mitigates the command injection issue.
  • Install the latest patched firmware on all affected A7100RU routers to remove the vulnerability.
  • If no update is available, disable remote access to the cstecgi.cgi endpoint or block HTTP requests to the router’s management interface from untrusted networks.
  • Configure firewall rules to restrict administrative interfaces to trusted IP addresses only.
  • Enable logging of CGI access and review logs for suspicious activity related to the setPasswordCfg function.

Generated by OpenCVE AI on April 13, 2026 at 18:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a7100ru
Vendors & Products Totolink a7100ru

Mon, 13 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument admpass leads to os command injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Title Totolink A7100RU CGI cstecgi.cgi setPasswordCfg os command injection
First Time appeared Totolink
Totolink a7100ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a7100ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A7100ru A7100ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T18:00:15.007Z

Reserved: 2026-04-13T08:45:05.331Z

Link: CVE-2026-6195

cve-icon Vulnrichment

Updated: 2026-04-13T17:59:59.131Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T18:16:32.353

Modified: 2026-04-22T20:23:16.350

Link: CVE-2026-6195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:33:47Z

Weaknesses