Description
A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function Vulnerability of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument proto leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-05-01
Score: 9.3 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerable CGI script cstecgi.cgi in the Totolink A8000RU firmware accepts a proto argument and passes it directly to the operating system for execution. This flaw permits an attacker to inject arbitrary shell commands into the proto field, leading to full remote code execution on the device. The impact is severe, compromising confidentiality, integrity, and availability of the affected router. The weakness is a classic command injection vulnerability (CWE-77/78).

Affected Systems

The issue affects the Totolink A8000RU model running firmware version 7.1cu.643_b20200521. No other devices or firmware versions are listed as affected. Administrators should verify that their routers are running this specific firmware build before taking remedial action.

Risk and Exploitability

The CVSS score of 9.3 reflects high exploitation risk. The EPSS score is not available, but the vulnerability is publicly documented and the exploit is reported as publicly available. The vulnerability can be triggered remotely without authentication, and the attacker can send a crafted request to the /cgi-bin/cstecgi.cgi endpoint to execute arbitrary commands. The lack of awareness of a KEV listing does not reduce the urgency, as the public exploits imply a realistic threat.

Generated by OpenCVE AI on May 1, 2026 at 04:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to a firmware release that removes the insecure handling of the proto argument and fixes the command injection flaw; consult Totolink’s release notes or support portal for the updated firmware.
  • Apply network segmentation or firewall rules that block external access to the /cgi-bin/cstecgi.cgi endpoint, limiting exposure to the local network or authenticated users only.
  • Implement input validation or parameter whitelisting for the proto argument to eliminate the possibility of shell injection; as a temporary measure, reject or sanitize any value that includes characters such as ';', '&', or '|' that could be interpreted by the shell.

Generated by OpenCVE AI on May 1, 2026 at 04:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 03:45:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a8000ru
Vendors & Products Totolink a8000ru

Fri, 01 May 2026 02:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function Vulnerability of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument proto leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
Title Totolink A8000RU CGI cstecgi.cgi vulnerability os command injection
First Time appeared Totolink
Totolink a8000ru Firmware
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:o:totolink:a8000ru_firmware:*:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a8000ru Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Totolink A8000ru A8000ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-01T01:30:16.768Z

Reserved: 2026-04-30T18:22:42.375Z

Link: CVE-2026-7538

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-01T02:16:04.533

Modified: 2026-05-01T02:16:04.533

Link: CVE-2026-7538

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T04:45:08Z

Weaknesses