Description
A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mode causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Published: 2026-04-27
Score: 9.3 Critical
EPSS: 1.3% Low
KEV: No
Impact: Remote code execution
Action: Apply patch
AI Analysis

Impact

The vulnerability resides in the setWiFiAclRules function of the /cgi-bin/cstecgi.cgi CGI handler. Manipulation of the "mode" argument allows an attacker to inject arbitrary operating‑system commands, leading to full remote code execution on the affected router. This flaw can compromise network confidentiality, integrity, and availability if exploited, as it gives the attacker control over the device and the Ability to alter its configuration or use it as a foothold into the local network.

Affected Systems

The flaw affects Totolink A8000RU routers running firmware version 7.1cu.643_b20200521. No other versions or product variants have been documented as impacted.

Risk and Exploitability

The CVSS score of 9.3 indicates a critical severity. Although an EPSS score is not available, the vulnerability is actively exploited as the exploit has been publicly released, and the document notes that the attack can be carried out remotely. Because the flaw is exposed through a publicly reachable CGI endpoint and no authentication is required for the vulnerable parameter, any remote host with network access to the router can potentially trigger command injection and take full control of the device. The absence of a KEV listing does not diminish the risk, as exploitation is already demonstrated in the wild.

Generated by OpenCVE AI on April 28, 2026 at 04:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router to the latest firmware release that addresses the command injection flaw.
  • If a rapid firmware update is not yet available, isolate the device by blocking external access to the /cgi-bin/cstecgi.cgi endpoint with a firewall or by disabling the web management interface entirely.
  • Implement strict input validation and parameter sanitization in the router’s CGI code to prevent future injection attempts based on CWE-77 and CWE-78.

Generated by OpenCVE AI on April 28, 2026 at 04:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 02:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a8000ru
Vendors & Products Totolink a8000ru

Mon, 27 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mode causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Title Totolink A8000RU CGI cstecgi.cgi setWiFiAclRules os command injection
First Time appeared Totolink
Totolink a8000ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a8000ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a8000ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A8000ru A8000ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-29T13:56:47.530Z

Reserved: 2026-04-26T19:30:11.754Z

Link: CVE-2026-7139

cve-icon Vulnrichment

Updated: 2026-04-29T13:56:43.317Z

cve-icon NVD

Status : Deferred

Published: 2026-04-27T17:16:45.293

Modified: 2026-04-27T18:35:53.583

Link: CVE-2026-7139

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T04:30:21Z

Weaknesses