CVE-2026-6028

Totolink · A7100RU

The Totolink A7100RU router is vulnerable to remote OS command injection in the setPptpServerCfg function, which is publicly exploitable.

Executive summary

A critical remote command injection vulnerability in Totolink A7100RU routers allows unauthenticated attackers to execute arbitrary commands with root-level privileges.

Vulnerability

This is an OS command injection vulnerability located in the /cgi-bin/cstecgi.cgi file. Attackers can manipulate the enable argument to execute system commands remotely without authentication.

Business impact

With a CVSS score of 9.8, the impact is catastrophic. An attacker can gain full control over the networking device, facilitating man-in-the-middle attacks, data interception, and persistence within the local network.

Remediation

Immediate Action: Apply the latest firmware update provided by Totolink to the affected A7100RU devices.

Proactive Monitoring: Monitor network traffic for suspicious cgi-bin activity and unexpected outbound connections from the router.

Compensating Controls: Disable remote management interfaces on the router and ensure it is not directly exposed to the public internet.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

The availability of a public exploit significantly increases the risk of this vulnerability. Administrators must update affected hardware immediately to prevent compromise.