CVE-2026-7152

Totolink · A8000RU

An OS command injection vulnerability in the Totolink A8000RU CGI handler allows unauthenticated remote attackers to execute arbitrary commands by manipulating the telnet_enabled argument.

Executive summary

A critical OS command injection vulnerability in the Totolink A8000RU router allows for unauthenticated remote code execution, posing an immediate risk of full device compromise.

Vulnerability

The flaw resides in the setTelnetCfg function of the /cgi-bin/cstecgi.cgi component, where the telnet_enabled argument fails to sanitize input, enabling remote OS command injection without requiring authentication.

Business impact

Given the CVSS score of 9.8, this flaw facilitates complete device takeover. Successful exploitation can lead to total loss of control over the router, facilitating man-in-the-middle attacks or lateral movement within the local network, creating significant reputational and security risks.

Remediation

Immediate Action: Update the firmware of the affected Totolink A8000RU device to the latest vendor-supplied version.

Proactive Monitoring: Review system logs for unusual activity originating from the /cgi-bin/cstecgi.cgi endpoint and monitor for unexpected changes to Telnet service configurations.

Compensating Controls: Disable remote management features on the router and implement strict firewall rules to prevent unauthorized access to the CGI interface.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Urgent remediation is required to secure the device against this command injection flaw. Organizations must apply the latest firmware update provided by the vendor to eliminate this vulnerability and prevent potential exploitation by malicious actors.