CVE-2026-5978

Totolink · A7100RU

The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setWiFiAclRules function, allowing remote attackers to execute arbitrary commands.

Executive summary

A critical remote OS command injection vulnerability in the Totolink A7100RU allows unauthenticated attackers to execute arbitrary commands via the mode parameter.

Vulnerability

The setWiFiAclRules function in /cgi-bin/cstecgi.cgi fails to sanitize the mode argument, allowing remote command injection.

Business impact

The CVSS score of 9.8 signifies a critical risk. Successful exploitation allows an attacker to seize control of the router, leading to potential data interception and lateral network movement.

Remediation

Immediate Action: Apply the latest vendor-provided firmware update.

Proactive Monitoring: Review system logs for suspicious activity and unauthorized command execution.

Compensating Controls: Disable remote access to the web management interface.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

All Totolink A7100RU units must be updated immediately to the latest firmware to prevent unauthorized remote command execution.