CVE-2026-7125
Totolink · A8000RU
An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the merge parameter in the setWiFiEasyCfg function.
Executive summary
A critical OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to execute arbitrary commands.
Vulnerability
This vulnerability occurs in the setWiFiEasyCfg function within /cgi-bin/cstecgi.cgi. The merge parameter is inadequately sanitized, allowing remote command injection by an unauthenticated attacker.
Business impact
The device is subject to total compromise, which poses a significant threat to internal network security. The 9.8 CVSS score justifies treating this as a high-priority security issue.
Remediation
Immediate Action: Update to the latest firmware version and disable the Wi-Fi Easy Configuration feature if possible.
Proactive Monitoring: Review router logs for any suspicious system-level commands being executed.
Compensating Controls: Restrict management interface access to local or trusted administrative subnets only.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
All affected users should immediately update their firmware. If a patch is unavailable, the device must be isolated from the WAN to prevent remote exploitation.