CVE-2026-7140
Totolink · A8000RU
An OS command injection vulnerability exists in the Totolink A8000RU CGI handler, allowing unauthenticated remote attackers to execute arbitrary system commands via the CsteSystem function.
Executive summary
A critical OS command injection vulnerability in the Totolink A8000RU router allows for unauthenticated remote code execution, posing an immediate risk of full device compromise.
Vulnerability
This vulnerability occurs in the CsteSystem function within the /cgi-bin/cstecgi.cgi component, where improper input validation of the HTTP argument enables remote OS command injection. The attack does not require authentication.
Business impact
With a CVSS score of 9.8, this vulnerability represents a critical risk to network infrastructure. Successful exploitation allows an attacker to gain full control over the router, potentially leading to unauthorized network access, data exfiltration, or the redirection of traffic, resulting in severe operational disruption and loss of confidentiality.
Remediation
Immediate Action: Apply the latest security firmware update provided by Totolink immediately.
Proactive Monitoring: Monitor network traffic and device logs for suspicious HTTP requests targeting the /cgi-bin/cstecgi.cgi endpoint, particularly those containing shell metacharacters.
Compensating Controls: Restrict access to the device's management interface to trusted IP addresses via a firewall or ACL to prevent external exploitation.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
The severity of this vulnerability necessitates immediate action. Administrators must prioritize patching the affected Totolink A8000RU devices to mitigate the risk of remote code execution. If patching is not immediately feasible, ensure the management interface is not exposed to the internet.