CVE-2026-5996

Totolink · A7100RU

A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler, allowing unauthenticated attackers to execute arbitrary system commands via the tty_server argument.

Executive summary

A critical remote OS command injection vulnerability in the Totolink A7100RU router poses an immediate risk of full device compromise by unauthenticated attackers.

Vulnerability

This is an OS command injection vulnerability located within the setAdvancedInfoShow function of the /cgi-bin/cstecgi.cgi component. The flaw allows an unauthenticated remote attacker to inject malicious commands via the tty_server parameter.

Business impact

Successful exploitation results in arbitrary code execution with root-level privileges on the network gateway. Given the CVSS score of 9.8, this vulnerability allows for complete system takeover, potential interception of sensitive network traffic, and lateral movement into the internal network, representing a severe risk to organizational data integrity and confidentiality.

Remediation

Immediate Action: Apply the latest vendor-supplied firmware update immediately to patch the vulnerable CGI handler.

Proactive Monitoring: Monitor network traffic for anomalous outbound connections from the gateway and audit system logs for unexpected execution of shell commands.

Compensating Controls: Implement strict firewall rules to restrict access to the web management interface to trusted administrative IP addresses only, effectively mitigating remote exploitation attempts.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

The severity of this flaw, combined with the availability of public exploit material, necessitates an immediate response. Network administrators should verify the firmware version of all Totolink A7100RU devices and apply updates without delay to prevent unauthorized remote access.