CVE-2026-6027

Totolink · A7100RU

A remote OS command injection vulnerability in the Totolink A7100RU CGI handler allows unauthenticated remote attackers to execute commands via the enable argument in setUrlFilterRules.

Executive summary

A critical remote OS command injection vulnerability in the Totolink A7100RU router allows unauthenticated attackers to execute arbitrary commands, leading to full device compromise.

Vulnerability

This vulnerability affects the setUrlFilterRules function in /cgi-bin/cstecgi.cgi. An unauthenticated attacker can trigger command injection by manipulating the enable argument.

Business impact

With a CVSS score of 9.8, this vulnerability represents an extreme risk. Successful exploitation allows for complete takeover of the router, potentially leading to widespread data interception, unauthorized network access, and the deployment of persistent malware on the device.

Remediation

Immediate Action: Update the device firmware to the latest version to patch the vulnerable CGI handler.

Proactive Monitoring: Maintain vigilance for anomalous device behavior and audit all management interface logs for unauthorized access attempts.

Compensating Controls: Implement network-level segmentation to isolate the management interface and use a WAF to block requests containing malicious command payloads.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Immediate action is mandatory to mitigate this critical vulnerability. Administrators should apply the vendor's firmware update as soon as possible and ensure that no vulnerable devices remain exposed to the public internet.