CVE-2026-5994
Totolink · A7100RU
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setTelnetCfg function, allowing remote attackers to execute arbitrary commands.
Executive summary
A critical remote OS command injection vulnerability in the Totolink A7100RU allows unauthenticated attackers to execute arbitrary commands via the telnet_enabled parameter.
Vulnerability
The setTelnetCfg function in /cgi-bin/cstecgi.cgi fails to sanitize the telnet_enabled argument, enabling remote OS command injection.
Business impact
The CVSS score of 9.8 signifies a critical risk of full device compromise. Attackers can gain root-level access to the router, enabling total control over the device and connected network.
Remediation
Immediate Action: Apply the latest firmware update provided by Totolink.
Proactive Monitoring: Monitor system logs for unauthorized access or command execution attempts.
Compensating Controls: Disable Telnet and remote management access on the device.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
Update Totolink A7100RU firmware immediately to mitigate this critical command injection vulnerability and prevent unauthorized remote access.