CVE-2026-7137
Totolink · A8000RU
An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the sambaEnabled parameter in the setStorageCfg function.
Executive summary
A critical OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to execute arbitrary commands.
Vulnerability
This vulnerability occurs in the setStorageCfg function within /cgi-bin/cstecgi.cgi due to insufficient sanitization of the sambaEnabled parameter, enabling remote OS command injection.
Business impact
The flaw grants an attacker full control over the router, which can lead to data breaches or network-wide compromise. The 9.8 CVSS score emphasizes the severity of this risk.
Remediation
Immediate Action: Update to the latest firmware version and disable Samba/storage sharing features if they are not necessary.
Proactive Monitoring: Review system logs for unexpected system-level command execution.
Compensating Controls: Use a firewall to restrict access to the device's management interface.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
Urgent firmware updates are necessary to secure the device. If an update is not immediately available, disable all unnecessary features and restrict external access to the device.