CVE-2026-7123
Totolink · A8000RU
An unauthenticated remote OS command injection vulnerability in the Totolink A8000RU CGI handler occurs via the setIptvCfg function.
Executive summary
A critical OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to execute arbitrary commands.
Vulnerability
This vulnerability affects the setIptvCfg function in the /cgi-bin/cstecgi.cgi file, where improper handling of the setIptvCfg argument allows for remote OS command injection.
Business impact
This vulnerability allows an attacker to gain full control of the network device. The CVSS score of 9.8 indicates that this is a critical risk, potentially allowing an attacker to reroute traffic or disable security controls.
Remediation
Immediate Action: Update to the latest firmware version and disable the IPTV configuration feature if not strictly required.
Proactive Monitoring: Monitor for unusual traffic patterns and unauthorized configuration changes on the router.
Compensating Controls: Implement strict network access control lists (ACLs) to prevent unauthorized access to the router's management interface.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
The severity and exploitability of this vulnerability demand immediate attention. Users should update their firmware to the latest available version and apply recommended network hardening techniques immediately.