CVE-2026-5995
Totolink · A7100RU
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setMiniuiHomeInfoShow function, allowing remote attackers to execute arbitrary commands.
Executive summary
A critical remote OS command injection vulnerability in the Totolink A7100RU allows unauthenticated attackers to execute arbitrary commands via the lan_info parameter.
Vulnerability
The setMiniuiHomeInfoShow function in /cgi-bin/cstecgi.cgi fails to sanitize the lan_info argument, enabling remote OS command injection.
Business impact
The CVSS score of 9.8 represents a critical risk. Attackers can leverage this to gain full control over the router, potentially compromising all traffic passing through the device.
Remediation
Immediate Action: Apply the latest vendor-provided firmware update.
Proactive Monitoring: Monitor network and device logs for suspicious activity.
Compensating Controls: Restrict device management access to trusted local networks.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
All Totolink A7100RU devices must be updated immediately to the latest firmware to prevent unauthorized remote command execution and potential system compromise.