CVE-2026-7139

Totolink · A8000RU

An unauthenticated remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler via the mode parameter in the setWiFiAclRules function.

Executive summary

A critical OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to execute arbitrary commands.

Vulnerability

The vulnerability affects the setWiFiAclRules function in /cgi-bin/cstecgi.cgi. The mode parameter is not properly sanitized, facilitating remote OS command injection by an unauthenticated attacker.

Business impact

The device is susceptible to total compromise, which can result in severe network security breaches. The 9.8 CVSS score confirms the high severity and potential for exploitation.

Remediation

Immediate Action: Update the device firmware to the latest available version and disable Wi-Fi ACL rules if not required.

Proactive Monitoring: Monitor logs for unauthorized configuration changes and suspicious command activity.

Compensating Controls: Use a firewall to block all WAN-side access to the management interface.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Immediate firmware updates are required to mitigate this threat. If a patch is unavailable, isolate the device from external networks to prevent unauthorized remote access.