CVE-2026-7155
Totolink · A8000RU
An OS command injection vulnerability in the Totolink A8000RU CGI handler allows unauthenticated remote attackers to execute arbitrary system commands via the admpass argument.
Executive summary
A critical OS command injection vulnerability in the Totolink A8000RU router allows for unauthenticated remote code execution, posing an immediate risk of full device compromise.
Vulnerability
The vulnerability is located in the setLoginPasswordCfg function of /cgi-bin/cstecgi.cgi, where improper validation of the admpass parameter allows for unauthenticated remote OS command injection.
Business impact
The CVSS score of 9.8 underscores the critical nature of this flaw. Exploitation allows an attacker to gain administrative control over the router, which can be used to intercept traffic, modify device settings, or deploy malware, leading to severe business and operational impacts.
Remediation
Immediate Action: Update the Totolink A8000RU device to the latest firmware version released by the manufacturer.
Proactive Monitoring: Monitor for unusual login or password change attempts and inspect logs for abnormal command strings directed at the CGI interface.
Compensating Controls: Restrict administrative access to the router to trusted internal subnets and ensure the management interface is not accessible from the public internet.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
To ensure the security of the network, administrators must apply the latest firmware update for the Totolink A8000RU without delay. Proactive patching is the most effective way to address this critical vulnerability and prevent unauthorized remote access.