CVE-2026-6114
Totolink · A7100RU
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler via the proto argument.
Executive summary
A remote OS command injection vulnerability in the Totolink A7100RU router enables unauthenticated remote code execution.
Vulnerability
The setNetworkCfg function in /cgi-bin/cstecgi.cgi fails to properly sanitize the proto argument, allowing an unauthenticated attacker to inject and execute arbitrary OS commands.
Business impact
The CVSS score of 9.8 reflects the high probability and impact of this vulnerability. Compromise of the router allows for total network visibility and control, posing a dire risk to the confidentiality, integrity, and availability of all connected systems.
Remediation
Immediate Action: Update the device to the most recent firmware version available from the manufacturer.
Proactive Monitoring: Monitor for anomalous system behavior and unauthorized configuration changes on the router.
Compensating Controls: Disable remote management interfaces and restrict access to the device's web management console to authorized personnel only.
Exploitation status
Public Exploit Available: True
Analyst recommendation
This is a critical vulnerability that can be exploited remotely by unauthenticated attackers. Security teams must prioritize updating affected devices and limiting exposure to untrusted networks.