CVE-2026-5853
Totolink · A7100RU
The Totolink A7100RU is vulnerable to remote OS command injection via the setIpv6LanCfg function, exploitable through the addrPrefixLen argument in the CGI handler.
Executive summary
A critical OS command injection vulnerability in Totolink A7100RU routers allows remote, unauthenticated attackers to execute arbitrary code.
Vulnerability
The setIpv6LanCfg function within the CGI handler fails to sanitize user input for the addrPrefixLen parameter, leading to an OS command injection vulnerability accessible to unauthenticated remote attackers.
Business impact
Successful exploitation results in full control of the device, enabling the attacker to manipulate network traffic and pivot into the internal network. The 9.8 CVSS score reflects the high severity of this remote, unauthenticated access vector.
Remediation
Immediate Action: Update the affected device to the latest firmware version provided by the manufacturer.
Proactive Monitoring: Review system logs for suspicious activity and monitor for unexpected changes to IPv6 settings.
Compensating Controls: Restrict management access to the device to a dedicated, secure management VLAN or trusted local IP addresses.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
Given the high-risk nature of this vulnerability and the availability of public exploits, immediate firmware updates are essential. Administrators should treat this as a high-priority remediation task for all deployed A7100RU units.