CVE-2026-6155
Totolink · A7100RU
Totolink A7100RU is vulnerable to remote OS command injection via the setWanCfg function in the CGI handler.
Executive summary
A critical OS command injection vulnerability in the Totolink A7100RU allows remote attackers to execute arbitrary commands with full system privileges.
Vulnerability
The setWanCfg function in /cgi-bin/cstecgi.cgi does not properly sanitize the pppoeServiceName argument, allowing for remote OS command injection by an unauthenticated attacker.
Business impact
A CVSS score of 9.8 signifies a critical risk of full system compromise. Attackers can gain control over network configuration and traffic, potentially leading to man-in-the-middle attacks or full internal network access.
Remediation
Immediate Action: Update to the latest firmware version as provided by Totolink to address the identified command injection vulnerability.
Proactive Monitoring: Monitor for suspicious network configuration changes or unusual outbound traffic from the router.
Compensating Controls: Use firewall rules to block internet-facing access to the device's web management interface.
Exploitation status
Public Exploit Available: True
Analyst recommendation
This is a high-priority issue. Administrators should update affected devices immediately and ensure that management interfaces are not exposed to the public internet.