CVE-2026-5850
Totolink · A7100RU
The Totolink A7100RU contains an OS command injection vulnerability in the setVpnPassCfg function, allowing remote attackers to execute arbitrary system commands via the pptpPassThru parameter.
Executive summary
A critical OS command injection vulnerability in Totolink A7100RU routers allows remote, unauthenticated attackers to achieve full system compromise.
Vulnerability
This is an OS command injection vulnerability within the CGI handler’s setVpnPassCfg function. An unauthenticated remote attacker can inject malicious commands through the pptpPassThru argument.
Business impact
Successful exploitation grants an attacker complete control over the affected network device. This facilitates unauthorized access to internal network traffic, potential interception of sensitive data, and the establishment of a persistent foothold for further lateral movement within the corporate environment. Given the CVSS score of 9.8, this poses a severe risk to organizational confidentiality, integrity, and availability.
Remediation
Immediate Action: Apply the latest firmware update provided by Totolink immediately to patch the vulnerable CGI handler.
Proactive Monitoring: Monitor network traffic for unusual outbound connections from the router and inspect system logs for anomalous command execution patterns.
Compensating Controls: Implement strict firewall rules to restrict access to the device's administrative interface and CGI endpoints from untrusted external networks.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
The presence of a publicly available exploit for this critical command injection flaw necessitates immediate action. Administrators must prioritize updating the firmware on all exposed A7100RU units to prevent unauthorized system access and potential full device takeover.