CVE-2026-7138

Totolink · A8000RU

An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the tz parameter in the setNtpCfg function.

Executive summary

A critical OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to execute arbitrary commands.

Vulnerability

The vulnerability is located in the setNtpCfg function of the /cgi-bin/cstecgi.cgi file, where the tz parameter can be used to inject and execute OS commands remotely.

Business impact

An attacker can gain complete control over the device, threatening network security and integrity. The 9.8 CVSS score indicates an extreme level of risk.

Remediation

Immediate Action: Apply the latest firmware update and disable unnecessary NTP configuration settings.

Proactive Monitoring: Monitor router logs for suspicious command execution patterns.

Compensating Controls: Restrict management access to the router via internal network only.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Immediate remediation is essential. Users should prioritize updating their firmware to the latest version to prevent potential exploitation.