CVE-2026-7244
Totolink · A8000RU
A remote OS command injection vulnerability in the Totolink A8000RU CGI handler is reachable via the setWiFiEasyGuestCfg function's merge argument.
Executive summary
A critical remote command injection vulnerability in the Totolink A8000RU router allows unauthenticated attackers to execute arbitrary system commands.
Vulnerability
The setWiFiEasyGuestCfg function within /cgi-bin/cstecgi.cgi is vulnerable to OS command injection. An unauthenticated remote attacker can inject commands by manipulating the merge argument.
Business impact
The CVSS score of 9.8 identifies this as a critical issue. Successful exploitation allows an attacker to gain full control over the router, compromising the security of both the primary and guest wireless networks.
Remediation
Immediate Action: Apply the latest firmware update provided by Totolink to remediate the vulnerability.
Proactive Monitoring: Monitor for unauthorized changes to guest Wi-Fi configurations and unusual system activity.
Compensating Controls: Restrict administrative access to the router to trusted internal management subnets.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
This vulnerability is highly severe and requires immediate patching. Administrators should verify the current firmware version and ensure it is updated to the latest release to prevent exploitation.