CVE-2026-6115
Totolink · A7100RU
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler via the enable argument.
Executive summary
A remote OS command injection vulnerability in the Totolink A7100RU router creates a critical risk of unauthorized remote code execution.
Vulnerability
The setAppCfg function in /cgi-bin/cstecgi.cgi contains an input sanitization flaw in the enable argument, which can be leveraged by an unauthenticated attacker to execute OS commands.
Business impact
The CVSS score of 9.8 highlights the critical nature of this vulnerability. Successful exploitation grants the attacker full control over the router, enabling persistent access and the ability to launch further attacks against the internal network.
Remediation
Immediate Action: Apply the vendor-provided firmware update immediately.
Proactive Monitoring: Analyze network traffic for unusual patterns or external connections originating from the router.
Compensating Controls: Restrict management access to the router to trusted, local network segments only.
Exploitation status
Public Exploit Available: True
Analyst recommendation
Administrators must treat this as a high-priority incident. Apply the necessary firmware updates to mitigate the risk of remote command execution and potential network-wide compromise.