CVE-2026-5852
Totolink · A7100RU
The Totolink A7100RU allows remote OS command injection via the setIptvCfg function by manipulating the igmpVer argument in the CGI handler.
Executive summary
A critical OS command injection flaw in Totolink A7100RU routers permits remote, unauthenticated attackers to execute arbitrary system commands.
Vulnerability
This vulnerability occurs in the setIptvCfg function of the CGI handler. An unauthenticated remote attacker can supply a malicious payload in the igmpVer argument to trigger OS command injection.
Business impact
The ability to execute arbitrary commands remotely on a network device leads to total compromise of the device's functionality. This could lead to redirection of traffic, man-in-the-middle attacks, and unauthorized access to protected internal resources, justifying the 9.8 CVSS score.
Remediation
Immediate Action: Apply the latest vendor-provided firmware update to address the vulnerability in the CGI handler.
Proactive Monitoring: Monitor for anomalous traffic patterns and unexpected system configuration changes within the router's logs.
Compensating Controls: Implement a Web Application Firewall (WAF) or equivalent filtering to inspect and block malicious CGI requests directed at the router.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
Urgent patching is required for all Totolink A7100RU devices. Administrators should ensure the latest firmware is deployed to mitigate the risk of remote command execution and potential network-wide compromise.