Description
A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-27
Score: 9.3 Critical
EPSS: 1.3% Low
KEV: No
Impact: Remote OS Command Injection
Action: Patch Now
AI Analysis

Impact

The vulnerability allows attackers to inject operating‑system commands through the admpass argument of the cstecgi.cgi CGI handler on the router. Manipulation of this parameter results in arbitrary shell command execution, giving the attacker full control over the device. The weakness is a classic command injection problem, indexed as CWE-77 and CWE-78, and the impact is a loss of confidentiality, integrity and availability on the affected device.

Affected Systems

The TOTOLINK A8000RU router, specifically firmware version 7.1cu.643_b20200521, is impacted by this flaw. No other products or firmware revisions are listed in the CVE data.

Risk and Exploitability

The CVSS score of 9.3 signifies severe risk, and the EPSS score is not provided, making it difficult to quantify current exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog, but the remote nature of the attack combined with the high exploit potential raise the risk to a critical level. An attacker who can reach the router’s CGI interface from outside can use the injection to execute arbitrary commands, compromise the device, and potentially pivot to internal network assets.

Generated by OpenCVE AI on April 28, 2026 at 12:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version released by Totolink that addresses the command injection flaw.
  • If a firmware update is not yet available, block external access to the /cgi-bin/cstecgi.cgi endpoint or disable remote management features on the router.
  • Configure firewall rules to detect and block suspicious requests targeting the admpass parameter, and monitor logs for abnormal activity.
  • Restrict management traffic for the router to the local network only when remote management is not required.

Generated by OpenCVE AI on April 28, 2026 at 12:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a8000ru
Vendors & Products Totolink a8000ru

Mon, 27 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Title Totolink A8000RU CGI cstecgi.cgi setLoginPasswordCfg os command injection
First Time appeared Totolink
Totolink a8000ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a8000ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a8000ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A8000ru A8000ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-28T14:47:12.800Z

Reserved: 2026-04-26T20:08:14.814Z

Link: CVE-2026-7155

cve-icon Vulnrichment

Updated: 2026-04-28T14:47:08.127Z

cve-icon NVD

Status : Deferred

Published: 2026-04-27T21:16:43.833

Modified: 2026-04-28T20:24:58.820

Link: CVE-2026-7155

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T13:00:15Z

Weaknesses