Description
A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-28
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in the router’s CGI handler allows an attacker to manipulate the merge argument of the setWiFiEasyGuestCfg function, which results in an OS command injection. By submitting a crafted HTTP request to the /cgi-bin/cstecgi.cgi endpoint, the attacker can execute arbitrary commands with the privileges of the device’s firmware, potentially taking full control of the router and any traffic passing through it. The weakness corresponds to CWE‑77 (Command Injection) and CWE‑78 (OS Command Injection).

Affected Systems

The vulnerability affects Totolink A8000RU routers that are running firmware version 7.1cu.643_b20200521. Owners of this build should check with Totolink for newer firmware releases that contain the fix.

Risk and Exploitability

The CVSS score of 9.3 indicates critical severity, and the EPSS score of less than 1% suggests that exploitation is expected to occur infrequently. Nevertheless, the flaw has been publicly released and, based on the description, it is inferred that authentication is not required. Attackers can trigger the injection from any remote location by sending a request to the CGI endpoint, and because the command is executed with firmware privileges, the potential impact includes complete device compromise. The vulnerability is not listed in the CISA KEV catalog, but that does not mitigate the risk.

Generated by OpenCVE AI on April 28, 2026 at 23:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the firmware update that fixes the CGI handler vulnerability, as released by Totolink for this device.
  • If a patch is not yet available, block or disable the /cgi-bin/cstecgi.cgi endpoint using firewall or router access‑control rules.
  • Restrict the router’s administrative interface to trusted internal networks and avoid exposing the device to the public Internet.

Generated by OpenCVE AI on April 28, 2026 at 23:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a8000ru
Vendors & Products Totolink a8000ru

Tue, 28 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.
Title Totolink A8000RU CGI cstecgi.cgi setWiFiEasyGuestCfg os command injection
First Time appeared Totolink
Totolink a8000ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a8000ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a8000ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A8000ru A8000ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-28T14:05:10.753Z

Reserved: 2026-04-27T17:22:56.495Z

Link: CVE-2026-7244

cve-icon Vulnrichment

Updated: 2026-04-28T14:05:07.619Z

cve-icon NVD

Status : Deferred

Published: 2026-04-28T09:16:17.950

Modified: 2026-04-28T20:24:20.377

Link: CVE-2026-7244

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T23:30:06Z

Weaknesses