CVE-2026-7243
Totolink · A8000RU
The Totolink A8000RU is susceptible to remote OS command injection in the setRadvdCfg function, reachable via the maxRtrAdvInterval argument.
Executive summary
A critical remote command injection vulnerability in the Totolink A8000RU router allows unauthenticated attackers to execute arbitrary system commands.
Vulnerability
This vulnerability is located in the setRadvdCfg function of the /cgi-bin/cstecgi.cgi file. An unauthenticated attacker can leverage the maxRtrAdvInterval argument to perform OS command injection.
Business impact
With a CVSS score of 9.8, this vulnerability poses a significant risk to the security of the network. Successful exploitation allows for complete device control, potentially leading to widespread network compromise and data theft.
Remediation
Immediate Action: Update the affected Totolink A8000RU unit to the latest firmware version.
Proactive Monitoring: Monitor for suspicious network traffic and verify the integrity of router configuration settings.
Compensating Controls: Block access to the CGI handler from untrusted sources using firewall or access control lists.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
Administrators must prioritize the firmware update to mitigate this high-risk vulnerability. Given the ease of exploitation, ensure that the device management interface is not exposed to the public internet.