CVE-2026-5978
Totolink · A7100RU
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setWiFiAclRules function, allowing remote attackers to execute arbitrary commands.
Executive summary
A critical remote OS command injection vulnerability in the Totolink A7100RU allows unauthenticated attackers to execute arbitrary commands via the mode parameter.
Vulnerability
The setWiFiAclRules function in /cgi-bin/cstecgi.cgi fails to sanitize the mode argument, allowing remote command injection.
Business impact
The CVSS score of 9.8 signifies a critical risk. Successful exploitation allows an attacker to seize control of the router, leading to potential data interception and lateral network movement.
Remediation
Immediate Action: Apply the latest vendor-provided firmware update.
Proactive Monitoring: Review system logs for suspicious activity and unauthorized command execution.
Compensating Controls: Disable remote access to the web management interface.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
All Totolink A7100RU units must be updated immediately to the latest firmware to prevent unauthorized remote command execution.