CVE-2026-7241

Totolink · A8000RU

The Totolink A8000RU is vulnerable to remote OS command injection via the setWiFiBasicCfg function, triggered by the wifiOff argument.

Executive summary

A critical remote command injection vulnerability in the Totolink A8000RU router allows unauthenticated attackers to execute arbitrary system commands.

Vulnerability

This vulnerability is found in the setWiFiBasicCfg function of the /cgi-bin/cstecgi.cgi component. Unauthenticated attackers can inject OS commands by manipulating the wifiOff argument.

Business impact

The CVSS score of 9.8 indicates a critical security risk. An attacker can execute arbitrary commands with high privileges, leading to full device compromise and potential disruption of wireless network services.

Remediation

Immediate Action: Apply the latest firmware update released by the vendor to resolve this vulnerability.

Proactive Monitoring: Inspect system logs for unusual behavior and monitor for unauthorized changes to Wi-Fi settings.

Compensating Controls: If a patch is unavailable, block all external access to the device management interface using firewall rules.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Patching is the only reliable way to fix this vulnerability. Administrators should ensure that all Totolink devices are updated to the latest version and verify that remote management is disabled to reduce the attack surface.