CVE-2026-5994

Totolink · A7100RU

The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setTelnetCfg function, allowing remote attackers to execute arbitrary commands.

Executive summary

A critical remote OS command injection vulnerability in the Totolink A7100RU allows unauthenticated attackers to execute arbitrary commands via the telnet_enabled parameter.

Vulnerability

The setTelnetCfg function in /cgi-bin/cstecgi.cgi fails to sanitize the telnet_enabled argument, enabling remote OS command injection.

Business impact

The CVSS score of 9.8 signifies a critical risk of full device compromise. Attackers can gain root-level access to the router, enabling total control over the device and connected network.

Remediation

Immediate Action: Apply the latest firmware update provided by Totolink.

Proactive Monitoring: Monitor system logs for unauthorized access or command execution attempts.

Compensating Controls: Disable Telnet and remote management access on the device.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Update Totolink A7100RU firmware immediately to mitigate this critical command injection vulnerability and prevent unauthorized remote access.