CVE-2026-7240
Totolink · A8000RU
A remote OS command injection vulnerability in the Totolink A8000RU CGI handler is reachable through the setVpnAccountCfg function's User argument.
Executive summary
A critical remote command injection vulnerability in the Totolink A8000RU router allows unauthenticated attackers to achieve full system control.
Vulnerability
The setVpnAccountCfg function in the /cgi-bin/cstecgi.cgi file fails to sanitize the User argument. This oversight enables an unauthenticated attacker to inject arbitrary OS commands remotely.
Business impact
With a CVSS score of 9.8, this is a high-impact vulnerability. Successful exploitation grants the attacker administrative access to the router, which can be used to compromise the entire network, intercept traffic, or facilitate lateral movement.
Remediation
Immediate Action: Update the affected device to the most recent firmware version provided by the manufacturer.
Proactive Monitoring: Monitor logs for suspicious input characters in web requests and watch for unauthorized VPN account modifications.
Compensating Controls: Disable remote management of the router and limit access to the internal network side only.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
Organizations should prioritize updating the vulnerable firmware. Given that this is a command injection vulnerability, it is essential to assume that any exposed device may have been compromised and to perform a security audit of the network environment post-patching.