CVE-2026-5853

Totolink · A7100RU

The Totolink A7100RU is vulnerable to remote OS command injection via the setIpv6LanCfg function, exploitable through the addrPrefixLen argument in the CGI handler.

Executive summary

A critical OS command injection vulnerability in Totolink A7100RU routers allows remote, unauthenticated attackers to execute arbitrary code.

Vulnerability

The setIpv6LanCfg function within the CGI handler fails to sanitize user input for the addrPrefixLen parameter, leading to an OS command injection vulnerability accessible to unauthenticated remote attackers.

Business impact

Successful exploitation results in full control of the device, enabling the attacker to manipulate network traffic and pivot into the internal network. The 9.8 CVSS score reflects the high severity of this remote, unauthenticated access vector.

Remediation

Immediate Action: Update the affected device to the latest firmware version provided by the manufacturer.

Proactive Monitoring: Review system logs for suspicious activity and monitor for unexpected changes to IPv6 settings.

Compensating Controls: Restrict management access to the device to a dedicated, secure management VLAN or trusted local IP addresses.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Given the high-risk nature of this vulnerability and the availability of public exploits, immediate firmware updates are essential. Administrators should treat this as a high-priority remediation task for all deployed A7100RU units.