CVE-2026-6025
Totolink · A7100RU
An OS command injection vulnerability in the Totolink A7100RU CGI handler allows unauthenticated remote attackers to execute arbitrary commands via the enable argument in setSyslogCfg.
Executive summary
A critical remote OS command injection vulnerability in the Totolink A7100RU router enables unauthenticated attackers to achieve full system execution.
Vulnerability
This vulnerability affects the setSyslogCfg function within /cgi-bin/cstecgi.cgi. Unauthenticated attackers can inject operating system commands by manipulating the enable parameter.
Business impact
A CVSS score of 9.8 reflects the high severity of this command injection flaw. Successful exploitation allows an attacker to bypass authentication, execute arbitrary code, and potentially exfiltrate logs or sensitive configuration data, resulting in a significant security breach and loss of device control.
Remediation
Immediate Action: Apply the vendor-provided firmware update to resolve the command injection vulnerability in the CGI handler.
Proactive Monitoring: Inspect system logs for unexpected execution of system commands or unusual traffic patterns associated with the syslog configuration component.
Compensating Controls: Implement a Web Application Firewall (WAF) or equivalent inspection tool to filter malicious payloads containing shell metacharacters from requests targeting the CGI interface.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
The risk posed by this vulnerability is critical. Security teams must prioritize patching or isolating the affected A7100RU devices to prevent potential compromise and unauthorized access to the underlying operating system.