CVE-2026-7136
Totolink · A8000RU
An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the wanIdx parameter in the setDmzCfg function.
Executive summary
A critical OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to execute arbitrary commands.
Vulnerability
The vulnerability resides in the setDmzCfg function in the /cgi-bin/cstecgi.cgi file. Improper input validation on the wanIdx parameter allows for remote OS command injection.
Business impact
The vulnerability provides an attacker with complete control over the device, facilitating unauthorized access to the network. The 9.8 CVSS score confirms the high severity and potential for large-scale impact.
Remediation
Immediate Action: Update to the latest firmware version and disable DMZ features if not strictly required.
Proactive Monitoring: Monitor logs for unauthorized configuration changes or anomalous process execution.
Compensating Controls: Block WAN-side access to the management interface using firewall rules.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
Immediate remediation is required. Organizations should ensure all Totolink devices are running the latest firmware to protect against this critical threat.