CVE-2026-6113

Totolink · A7100RU

A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler via the ttyEnable argument.

Executive summary

A remote OS command injection vulnerability in the Totolink A7100RU router allows unauthenticated attackers to gain full control of the device.

Vulnerability

This vulnerability resides in the setTtyServiceCfg function in /cgi-bin/cstecgi.cgi. An unauthenticated attacker can manipulate the ttyEnable argument to trigger OS command injection.

Business impact

With a CVSS score of 9.8, this vulnerability is critical. An attacker can compromise the device to intercept traffic, conduct man-in-the-middle attacks, or pivot into the internal network, leading to severe reputational and security consequences for the organization.

Remediation

Immediate Action: Apply the latest firmware update provided by the vendor to remediate the vulnerable CGI handler.

Proactive Monitoring: Review web server logs for suspicious CGI requests containing command-line injection patterns.

Compensating Controls: Implement a Web Application Firewall (WAF) or equivalent ingress filtering to block malicious requests directed at /cgi-bin/cstecgi.cgi.

Exploitation status

Public Exploit Available: True

Analyst recommendation

Given the critical severity and the availability of public exploits, this vulnerability must be addressed immediately. Ensure all vulnerable routers are updated and isolated from public access where possible.