CVE-2026-5852

Totolink · A7100RU

The Totolink A7100RU allows remote OS command injection via the setIptvCfg function by manipulating the igmpVer argument in the CGI handler.

Executive summary

A critical OS command injection flaw in Totolink A7100RU routers permits remote, unauthenticated attackers to execute arbitrary system commands.

Vulnerability

This vulnerability occurs in the setIptvCfg function of the CGI handler. An unauthenticated remote attacker can supply a malicious payload in the igmpVer argument to trigger OS command injection.

Business impact

The ability to execute arbitrary commands remotely on a network device leads to total compromise of the device's functionality. This could lead to redirection of traffic, man-in-the-middle attacks, and unauthorized access to protected internal resources, justifying the 9.8 CVSS score.

Remediation

Immediate Action: Apply the latest vendor-provided firmware update to address the vulnerability in the CGI handler.

Proactive Monitoring: Monitor for anomalous traffic patterns and unexpected system configuration changes within the router's logs.

Compensating Controls: Implement a Web Application Firewall (WAF) or equivalent filtering to inspect and block malicious CGI requests directed at the router.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Urgent patching is required for all Totolink A7100RU devices. Administrators should ensure the latest firmware is deployed to mitigate the risk of remote command execution and potential network-wide compromise.