CVE-2026-6131

Acer · Totolink A7100RU

Acer Totolink A7100RU is vulnerable to remote OS command injection via the setTracerouteCfg function in the CGI handler.

Executive summary

A critical OS command injection vulnerability in the Acer Totolink A7100RU allows remote, unauthenticated attackers to execute arbitrary commands on the system.

Vulnerability

The setTracerouteCfg function in /cgi-bin/cstecgi.cgi lacks proper input validation on the command argument, enabling an unauthenticated attacker to perform OS command injection.

Business impact

With a CVSS score of 9.8, this vulnerability allows for complete device control. This could lead to unauthorized access to the local area network, interception of sensitive data, and potential use of the device in larger-scale attacks.

Remediation

Immediate Action: Install the latest firmware update provided by Acer/Totolink to resolve this command injection vulnerability.

Proactive Monitoring: Monitor for unusual traceroute or diagnostic requests and unexpected system command execution.

Compensating Controls: Restrict access to the router's web-based management interface to authorized administrative workstations.

Exploitation status

Public Exploit Available: True

Analyst recommendation

Immediate remediation is essential. Administrators must update the device firmware and limit exposure of the management interface to mitigate the risk of remote command execution.