CVE-2026-6131
Acer · Totolink A7100RU
Acer Totolink A7100RU is vulnerable to remote OS command injection via the setTracerouteCfg function in the CGI handler.
Executive summary
A critical OS command injection vulnerability in the Acer Totolink A7100RU allows remote, unauthenticated attackers to execute arbitrary commands on the system.
Vulnerability
The setTracerouteCfg function in /cgi-bin/cstecgi.cgi lacks proper input validation on the command argument, enabling an unauthenticated attacker to perform OS command injection.
Business impact
With a CVSS score of 9.8, this vulnerability allows for complete device control. This could lead to unauthorized access to the local area network, interception of sensitive data, and potential use of the device in larger-scale attacks.
Remediation
Immediate Action: Install the latest firmware update provided by Acer/Totolink to resolve this command injection vulnerability.
Proactive Monitoring: Monitor for unusual traceroute or diagnostic requests and unexpected system command execution.
Compensating Controls: Restrict access to the router's web-based management interface to authorized administrative workstations.
Exploitation status
Public Exploit Available: True
Analyst recommendation
Immediate remediation is essential. Administrators must update the device firmware and limit exposure of the management interface to mitigate the risk of remote command execution.