CVE-2026-7202
Totolink · A8000RU
A remote OS command injection vulnerability in the Totolink A8000RU CGI handler allows attackers to execute arbitrary code via the wscDisabled argument.
Executive summary
A critical remote command injection vulnerability in the Totolink A8000RU router allows unauthenticated attackers to achieve full system compromise.
Vulnerability
This is an OS command injection vulnerability within the setWiFiWpsStart function of the /cgi-bin/cstecgi.cgi handler. The vulnerability permits an unauthenticated remote attacker to inject malicious system commands by manipulating the wscDisabled argument.
Business impact
The CVSS score of 9.8 reflects the extreme severity of this flaw, as it allows for complete unauthorized control over the networking device. Successful exploitation could lead to total loss of device integrity, interception of network traffic, and a pivot point for further lateral movement within the corporate or home network.
Remediation
Immediate Action: Apply the latest firmware update provided by Totolink immediately to patch the affected CGI handler.
Proactive Monitoring: Monitor network traffic for unusual outbound connections from the router and inspect system logs for anomalous command execution patterns.
Compensating Controls: Deploy a Web Application Firewall (WAF) or intrusion prevention system (IPS) to block malicious requests targeting the /cgi-bin/cstecgi.cgi endpoint.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
Given the critical nature of this vulnerability and the availability of public exploits, organizations must prioritize patching the affected Totolink hardware. If an update is not immediately feasible, restrict management interface access to trusted administrative networks only.