CVE-2026-6028
Totolink · A7100RU
The Totolink A7100RU router is vulnerable to remote OS command injection in the setPptpServerCfg function, which is publicly exploitable.
Executive summary
A critical remote command injection vulnerability in Totolink A7100RU routers allows unauthenticated attackers to execute arbitrary commands with root-level privileges.
Vulnerability
This is an OS command injection vulnerability located in the /cgi-bin/cstecgi.cgi file. Attackers can manipulate the enable argument to execute system commands remotely without authentication.
Business impact
With a CVSS score of 9.8, the impact is catastrophic. An attacker can gain full control over the networking device, facilitating man-in-the-middle attacks, data interception, and persistence within the local network.
Remediation
Immediate Action: Apply the latest firmware update provided by Totolink to the affected A7100RU devices.
Proactive Monitoring: Monitor network traffic for suspicious cgi-bin activity and unexpected outbound connections from the router.
Compensating Controls: Disable remote management interfaces on the router and ensure it is not directly exposed to the public internet.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
The availability of a public exploit significantly increases the risk of this vulnerability. Administrators must update affected hardware immediately to prevent compromise.