CVE-2026-5975

Totolink · A7100RU

The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setDmzCfg function, allowing remote attackers to execute arbitrary commands.

Executive summary

A critical OS command injection vulnerability in the Totolink A7100RU allows remote, unauthenticated attackers to achieve full system compromise.

Vulnerability

The setDmzCfg function within the /cgi-bin/cstecgi.cgi component fails to sanitize the wanIdx argument. This flaw allows a remote attacker to inject and execute arbitrary operating system commands with elevated privileges.

Business impact

With a CVSS score of 9.8, this vulnerability allows complete device takeover. An attacker can gain persistent access to the router, intercept network traffic, and use the device as a pivot point to attack other systems on the internal network.

Remediation

Immediate Action: Apply the latest firmware update provided by Totolink for the A7100RU.

Proactive Monitoring: Monitor network traffic for unusual outbound connections or attempted management interface access from unknown sources.

Compensating Controls: Disable remote management access on the WAN interface and ensure the device is not directly exposed to the public internet.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

This is a critical vulnerability that allows for full device compromise. Given the availability of public exploits, all affected Totolink A7100RU devices should be updated or isolated from the network immediately to prevent unauthorized access.