CVE-2026-6140

Totolink · A7100RU

Totolink A7100RU is susceptible to remote OS command injection via the UploadFirmwareFile function in the CGI handler.

Executive summary

A critical OS command injection vulnerability in the Totolink A7100RU enables remote, unauthenticated attackers to execute arbitrary commands on the system.

Vulnerability

The UploadFirmwareFile function in /cgi-bin/cstecgi.cgi lacks adequate input validation for the FileName argument, permitting remote OS command injection.

Business impact

With a CVSS score of 9.8, this vulnerability allows for complete system compromise. Attackers could potentially overwrite firmware or execute malicious code, leading to long-term persistence and unauthorized access to network traffic.

Remediation

Immediate Action: Update to the latest firmware version released by Totolink to address the vulnerability in the CGI handler.

Proactive Monitoring: Monitor logs for unauthorized or suspicious firmware upload attempts.

Compensating Controls: Restrict administrative access to the router's web interface to authorized management subnets only.

Exploitation status

Public Exploit Available: True

Analyst recommendation

The risk posed by this vulnerability is extreme. It is essential to apply the vendor-provided firmware update immediately and restrict exposure of the web management interface.