CVE-2026-7121
Totolink · A8000RU
A remote OS command injection vulnerability in the Totolink A8000RU CGI handler allows unauthenticated attackers to execute arbitrary commands via the wizard parameter.
Executive summary
A critical OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to gain full system control.
Vulnerability
This is an OS command injection vulnerability within the setWizardCfg function of the /cgi-bin/cstecgi.cgi component. The application fails to sanitize the wizard argument, allowing an unauthenticated remote attacker to inject and execute arbitrary system commands.
Business impact
The vulnerability allows for full remote compromise of the device, which could be used as a pivot point into the local network. With a CVSS score of 9.8, the risk of complete device takeover and subsequent lateral movement is severe.
Remediation
Immediate Action: Disconnect the affected device from the internet or apply the latest manufacturer firmware patch if available.
Proactive Monitoring: Monitor network traffic for unusual outbound connections or shell-like activity originating from the router.
Compensating Controls: Restrict management interface access to trusted IP addresses only via firewall rules.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
Due to the availability of public exploit code and the critical nature of the vulnerability, immediate mitigation is required. If a firmware update is not available, the device should be isolated from external network access to prevent compromise.