CVE-2026-6029

Totolink · A7100RU

The Totolink A7100RU router is vulnerable to remote OS command injection in the setVpnAccountCfg function, which is publicly exploitable.

Executive summary

A critical remote command injection vulnerability in Totolink A7100RU routers allows unauthenticated attackers to execute arbitrary code via manipulated user arguments.

Vulnerability

This is an OS command injection vulnerability located in the /cgi-bin/cstecgi.cgi file. Attackers can manipulate the User argument to execute system commands remotely without authentication.

Business impact

With a CVSS score of 9.8, the impact is severe. Successful exploitation allows for complete takeover of the router, potentially leading to network-wide surveillance or the redirection of traffic to malicious destinations.

Remediation

Immediate Action: Update the firmware of all affected Totolink A7100RU devices to the latest available version.

Proactive Monitoring: Inspect router logs for anomalous entries in the setVpnAccountCfg function and unusual administrative activity.

Compensating Controls: Restrict access to the router's web management interface to trusted internal segments only.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Given the public availability of an exploit, this vulnerability poses an imminent threat. Organizations must prioritize firmware updates to mitigate the risk of remote system control.