CVE-2026-7153
Totolink · A8000RU
An OS command injection vulnerability in the Totolink A8000RU CGI handler allows unauthenticated remote attackers to execute arbitrary system commands via the sys_info argument.
Executive summary
A critical OS command injection vulnerability in the Totolink A8000RU router allows for unauthenticated remote code execution, posing an immediate risk of full device compromise.
Vulnerability
This vulnerability affects the setMiniuiHomeInfoShow function in /cgi-bin/cstecgi.cgi, where insufficient filtering of the sys_info argument permits unauthenticated remote OS command injection.
Business impact
The CVSS score of 9.8 reflects the high severity of this remote code execution flaw. If exploited, an attacker could gain persistent access to the network, potentially leading to data exfiltration and severe compromise of the internal network integrity.
Remediation
Immediate Action: Update the Totolink A8000RU device to the latest available firmware release.
Proactive Monitoring: Monitor for anomalous traffic patterns directed at the CGI interface and watch for unauthorized command execution attempts in system logs.
Compensating Controls: Use a Web Application Firewall (WAF) or equivalent network security policy to filter malicious payloads targeting the /cgi-bin/cstecgi.cgi URI.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
Security teams must prioritize the deployment of the latest firmware update to neutralize this vulnerability. Given the availability of public exploits, the window for remediation is narrow, and failure to act may expose the network to unauthorized remote control.