CVE-2026-7203

Totolink · A8000RU

A remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler, reachable via the setUrlFilterRules function and the enable argument.

Executive summary

A critical remote command injection vulnerability in the Totolink A8000RU router allows unauthenticated attackers to execute arbitrary system commands.

Vulnerability

The vulnerability resides in the setUrlFilterRules function within the /cgi-bin/cstecgi.cgi file. An unauthenticated attacker can trigger remote OS command injection by passing malicious input to the enable parameter.

Business impact

With a CVSS score of 9.8, this vulnerability represents a severe threat to network infrastructure. Exploitation grants an attacker the ability to bypass security filters, modify device configurations, and execute arbitrary code, potentially leading to a complete breach of the network segment managed by the device.

Remediation

Immediate Action: Update the firmware to the latest version provided by the manufacturer to resolve the command injection flaw.

Proactive Monitoring: Review system logs for unexpected execution of shell commands and monitor for unauthorized changes to URL filtering rules.

Compensating Controls: Implement strict network segmentation and ensure the router's management interface is not exposed to the public internet.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

This flaw requires immediate attention due to the high risk of remote takeover. Administrators should apply the vendor-supplied patch as the primary mitigation and ensure that access to the device management interface is restricted to authorized users only.