Description
A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiBasicCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument wifiOff results in os command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
Published: 2026-04-28
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote command execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in the setWiFiBasicCfg function of the /cgi-bin/cstecgi.cgi script allows an attacker to inject arbitrary operating‑system commands by manipulating the wifiOff argument. The vulnerability can be triggered remotely via standard HTTP requests and, once exploited, gives the attacker full control over the router’s operating system, enabling persistence, data exfiltration, or pivoting into the local network.

Affected Systems

The flaw is present in the Totolink A8000RU router running firmware version 7.1cu.643_b20200521. The affected vendor is Totolink, model A8000RU, and the issue has been documented for this specific firmware build. Users of this model should verify whether their firmware matches the affected version and determine whether newer releases contain the fix.

Risk and Exploitability

The CVSS score of 9.3 marks this as a critical weakness with a high likelihood of exploitation. Although the EPSS score is currently unavailable, the public release of a working exploit and the lack of a patch in the KEV catalog point to a real and immediate threat. The weakest access requirement is remote network connectivity to the router’s web interface or administration endpoints, making the attack vector easily exploitable from outside the local network.

Generated by OpenCVE AI on April 28, 2026 at 12:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s latest firmware release that contains the fix for the command‑injection vulnerability on the A8000RU.
  • Disable remote access to the router’s WiFi configuration and administration interface if it is not required for your network.
  • Configure firewall or router rules to block external HTTP traffic to the /cgi-bin/cstecgi.cgi path or to the entire router management port.
  • Continuously monitor router logs and network traffic for anomalous activity that may indicate an attempt to exploit the command injection.

Generated by OpenCVE AI on April 28, 2026 at 12:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a8000ru
Vendors & Products Totolink a8000ru

Tue, 28 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiBasicCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument wifiOff results in os command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
Title Totolink A8000RU CGI cstecgi.cgi setWiFiBasicCfg os command injection
First Time appeared Totolink
Totolink a8000ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a8000ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a8000ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A8000ru A8000ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-28T07:30:13.634Z

Reserved: 2026-04-27T17:22:46.191Z

Link: CVE-2026-7241

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-04-28T09:16:17.457

Modified: 2026-04-28T20:24:20.377

Link: CVE-2026-7241

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T12:30:31Z

Weaknesses