CVE-2026-6113
Totolink · A7100RU
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler via the ttyEnable argument.
Executive summary
A remote OS command injection vulnerability in the Totolink A7100RU router allows unauthenticated attackers to gain full control of the device.
Vulnerability
This vulnerability resides in the setTtyServiceCfg function in /cgi-bin/cstecgi.cgi. An unauthenticated attacker can manipulate the ttyEnable argument to trigger OS command injection.
Business impact
With a CVSS score of 9.8, this vulnerability is critical. An attacker can compromise the device to intercept traffic, conduct man-in-the-middle attacks, or pivot into the internal network, leading to severe reputational and security consequences for the organization.
Remediation
Immediate Action: Apply the latest firmware update provided by the vendor to remediate the vulnerable CGI handler.
Proactive Monitoring: Review web server logs for suspicious CGI requests containing command-line injection patterns.
Compensating Controls: Implement a Web Application Firewall (WAF) or equivalent ingress filtering to block malicious requests directed at /cgi-bin/cstecgi.cgi.
Exploitation status
Public Exploit Available: True
Analyst recommendation
Given the critical severity and the availability of public exploits, this vulnerability must be addressed immediately. Ensure all vulnerable routers are updated and isolated from public access where possible.