CVE-2026-7122

Totolink · A8000RU

An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the enable parameter in the setUPnPCfg function.

Executive summary

A critical OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to execute arbitrary commands.

Vulnerability

The vulnerability resides in the setUPnPCfg function within the /cgi-bin/cstecgi.cgi file. Lack of input sanitization on the enable argument permits remote OS command injection by an unauthenticated user.

Business impact

The flaw provides an attacker with the ability to execute commands with high privileges on the device. Given the 9.8 CVSS score, this represents a major threat to network integrity, allowing for potential man-in-the-middle attacks or total network traffic interception.

Remediation

Immediate Action: Disable UPnP and remote management features immediately, and apply available firmware updates.

Proactive Monitoring: Review system logs for suspicious process execution or unexpected configuration changes.

Compensating Controls: Use a firewall to block external access to the device's web management interface.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Organizations utilizing the Totolink A8000RU must treat this as a critical security incident. The presence of public exploits necessitates immediate isolation of the device from untrusted networks until a secure firmware version can be deployed.