CVE-2026-7138
Totolink · A8000RU
An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the tz parameter in the setNtpCfg function.
Executive summary
A critical OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to execute arbitrary commands.
Vulnerability
The vulnerability is located in the setNtpCfg function of the /cgi-bin/cstecgi.cgi file, where the tz parameter can be used to inject and execute OS commands remotely.
Business impact
An attacker can gain complete control over the device, threatening network security and integrity. The 9.8 CVSS score indicates an extreme level of risk.
Remediation
Immediate Action: Apply the latest firmware update and disable unnecessary NTP configuration settings.
Proactive Monitoring: Monitor router logs for suspicious command execution patterns.
Compensating Controls: Restrict management access to the router via internal network only.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
Immediate remediation is essential. Users should prioritize updating their firmware to the latest version to prevent potential exploitation.