CVE-2026-7203
Totolink · A8000RU
A remote OS command injection vulnerability exists in the Totolink A8000RU CGI handler, reachable via the setUrlFilterRules function and the enable argument.
Executive summary
A critical remote command injection vulnerability in the Totolink A8000RU router allows unauthenticated attackers to execute arbitrary system commands.
Vulnerability
The vulnerability resides in the setUrlFilterRules function within the /cgi-bin/cstecgi.cgi file. An unauthenticated attacker can trigger remote OS command injection by passing malicious input to the enable parameter.
Business impact
With a CVSS score of 9.8, this vulnerability represents a severe threat to network infrastructure. Exploitation grants an attacker the ability to bypass security filters, modify device configurations, and execute arbitrary code, potentially leading to a complete breach of the network segment managed by the device.
Remediation
Immediate Action: Update the firmware to the latest version provided by the manufacturer to resolve the command injection flaw.
Proactive Monitoring: Review system logs for unexpected execution of shell commands and monitor for unauthorized changes to URL filtering rules.
Compensating Controls: Implement strict network segmentation and ensure the router's management interface is not exposed to the public internet.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
This flaw requires immediate attention due to the high risk of remote takeover. Administrators should apply the vendor-supplied patch as the primary mitigation and ensure that access to the device management interface is restricted to authorized users only.