Description
A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWiFiWpsStart of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument wscDisabled leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-04-27
Score: 9.3 Critical
EPSS: 1.3% Low
KEV: No
Impact: Remote Command Execution via OS Command Injection
Action: Apply Patches
AI Analysis

Impact

The vulnerability allows an attacker to execute arbitrary operating system commands by manipulating the wscDisabled argument in the setWiFiWpsStart function of /cgi-bin/cstecgi.cgi. This results in Remote Command Execution, as attackers can run any shell command with the privileges of the router process. The weakness is a classic OS command injection (CWE‑78) and a denial of service possibility if the command leads to resource exhaustion (CWE‑77).

Affected Systems

Totolink A8000RU routers running firmware version 7.1cu.643_b20200521 are affected. No other versions or vendors were enumerated in the data.

Risk and Exploitability

The CVSS score of 9.3 indicates Critical severity, and the EPSS score is not available, so the exact likelihood of exploitation cannot be quantified. The vulnerability is not listed in the CISA KEV catalog, but the public disclosure and remote nature of the attack vector make it a high-risk exposure. Attackers can exploit the flaw remotely by sending crafted requests to the router’s web interface, bypassing authentication or using default credentials, and trigger arbitrary command execution on the device.

Generated by OpenCVE AI on April 28, 2026 at 12:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Totolink firmware update that resolves the command injection in setWiFiWpsStart
  • If a firmware update is unavailable, disable the WPS feature through the router’s configuration interface or reject the wscDisabled parameter entirely
  • Restrict external access to the router’s web interface by limiting its management network to trusted IP ranges or VLANs, and monitor web‑interface logs for suspicious requests

Generated by OpenCVE AI on April 28, 2026 at 12:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 05:00:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a8000ru
Vendors & Products Totolink a8000ru

Tue, 28 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWiFiWpsStart of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument wscDisabled leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Title Totolink A8000RU CGI cstecgi.cgi setWiFiWpsStart os command injection
First Time appeared Totolink
Totolink a8000ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a8000ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a8000ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A8000ru A8000ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-29T14:13:11.537Z

Reserved: 2026-04-27T13:56:10.591Z

Link: CVE-2026-7202

cve-icon Vulnrichment

Updated: 2026-04-29T14:13:07.739Z

cve-icon NVD

Status : Deferred

Published: 2026-04-28T01:16:01.423

Modified: 2026-04-28T20:24:58.820

Link: CVE-2026-7202

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T12:45:31Z

Weaknesses