CVE-2026-5975
Totolink · A7100RU
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setDmzCfg function, allowing remote attackers to execute arbitrary commands.
Executive summary
A critical OS command injection vulnerability in the Totolink A7100RU allows remote, unauthenticated attackers to achieve full system compromise.
Vulnerability
The setDmzCfg function within the /cgi-bin/cstecgi.cgi component fails to sanitize the wanIdx argument. This flaw allows a remote attacker to inject and execute arbitrary operating system commands with elevated privileges.
Business impact
With a CVSS score of 9.8, this vulnerability allows complete device takeover. An attacker can gain persistent access to the router, intercept network traffic, and use the device as a pivot point to attack other systems on the internal network.
Remediation
Immediate Action: Apply the latest firmware update provided by Totolink for the A7100RU.
Proactive Monitoring: Monitor network traffic for unusual outbound connections or attempted management interface access from unknown sources.
Compensating Controls: Disable remote management access on the WAN interface and ensure the device is not directly exposed to the public internet.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
This is a critical vulnerability that allows for full device compromise. Given the availability of public exploits, all affected Totolink A7100RU devices should be updated or isolated from the network immediately to prevent unauthorized access.