CVE-2026-7123

Totolink · A8000RU

An unauthenticated remote OS command injection vulnerability in the Totolink A8000RU CGI handler occurs via the setIptvCfg function.

Executive summary

A critical OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to execute arbitrary commands.

Vulnerability

This vulnerability affects the setIptvCfg function in the /cgi-bin/cstecgi.cgi file, where improper handling of the setIptvCfg argument allows for remote OS command injection.

Business impact

This vulnerability allows an attacker to gain full control of the network device. The CVSS score of 9.8 indicates that this is a critical risk, potentially allowing an attacker to reroute traffic or disable security controls.

Remediation

Immediate Action: Update to the latest firmware version and disable the IPTV configuration feature if not strictly required.

Proactive Monitoring: Monitor for unusual traffic patterns and unauthorized configuration changes on the router.

Compensating Controls: Implement strict network access control lists (ACLs) to prevent unauthorized access to the router's management interface.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

The severity and exploitability of this vulnerability demand immediate attention. Users should update their firmware to the latest available version and apply recommended network hardening techniques immediately.