Totolink A7100RU CGI cstecgi.cgi setAdvancedInfoShow os command injection
翻訳中…プラットフォーム
linux
コンポーネント
totolink-a7100ru
修正版
7.4.1
CVE-2026-5996 describes a critical Command Injection vulnerability affecting the Totolink A7100RU router. This flaw allows attackers to execute arbitrary operating system commands on the device, potentially leading to complete system takeover. The vulnerability specifically impacts firmware versions 7.4cu.2313b20191024–7.4cu.2313b20191024, and a fix is pending.
影響と攻撃シナリオ翻訳中…
The Command Injection vulnerability in Totolink A7100RU allows an attacker to inject and execute arbitrary commands on the router's operating system. This is a severe risk because it bypasses normal access controls and grants the attacker the privileges of the system user. Successful exploitation could lead to data theft (configuration files, user credentials), malware installation, and complete control over the router, enabling the attacker to pivot to other devices on the network. The ability to execute arbitrary commands effectively grants the attacker root access, significantly expanding the potential blast radius. This vulnerability shares similarities with other command injection flaws where improper input validation allows attackers to inject malicious code.
悪用の状況翻訳中…
This vulnerability has been publicly disclosed, increasing the likelihood of exploitation. The CVSS score of 9.8 (CRITICAL) indicates a high level of severity. While an EPSS score is not available, the public disclosure and high CVSS score suggest a medium to high probability of exploitation. No known KEV listing exists at the time of writing. Public proof-of-concept exploits are likely to emerge given the vulnerability's nature and public disclosure.
リスク対象者翻訳中…
Small to medium-sized businesses and home users relying on the Totolink A7100RU router are at risk. Specifically, those with exposed routers or those using default configurations are particularly vulnerable. Shared hosting environments utilizing this router could also be impacted, potentially affecting multiple tenants.
検出手順翻訳中…
• linux / server:
journalctl -u cstecgi -g 'tty_server' | grep -i 'command injection'• generic web:
curl -s 'http://<router_ip>/cgi-bin/cstecgi.cgi?tty_server=;id;' | grep -i 'id='攻撃タイムライン
- Disclosure
disclosure
脅威インテリジェンス
エクスプロイト状況
EPSS
1.25% (79% パーセンタイル)
CISA SSVC
CVSS ベクトル
これらのメトリクスの意味は?
- Attack Vector
- ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
- Attack Complexity
- 低 — 特別な条件不要。安定して悪用可能。
- Privileges Required
- なし — 認証不要。資格情報なしで悪用可能。
- User Interaction
- なし — 自動かつ無音の攻撃。被害者は何もしない。
- Scope
- 変化なし — 影響は脆弱なコンポーネントのみ。
- Confidentiality
- 高 — 機密性の完全喪失。全データが読み取り可能。
- Integrity
- 高 — 任意のデータの書き込み・変更・削除が可能。
- Availability
- 高 — 完全なクラッシュまたはリソース枯渇。完全なサービス拒否。
影響を受けるソフトウェア
弱点分類 (CWE)
タイムライン
- 予約済み
- 公開日
- 更新日
- EPSS 更新日
緩和策と回避策翻訳中…
Due to the lack of a provided fixed version, immediate mitigation strategies are crucial. Implement a Web Application Firewall (WAF) rule to filter potentially malicious input to the /cgi-bin/cstecgi.cgi endpoint, specifically targeting the tty_server parameter. Strict input validation should be enforced to prevent the injection of shell commands. Consider temporarily disabling the affected functionality if possible. Monitor router logs for suspicious activity, particularly attempts to access /cgi-bin/cstecgi.cgi with unusual parameters. After a fix is released, upgrade the router firmware to the patched version and verify functionality by attempting to access the affected endpoint with a benign request.
修正方法翻訳中…
Actualice el firmware del dispositivo Totolink A7100RU a una versión corregida por el fabricante. Consulte el sitio web oficial de Totolink para obtener la última versión del firmware y las instrucciones de actualización.
CVEセキュリティニュースレター
脆弱性分析と重要アラートをメールでお届けします。
よくある質問翻訳中…
What is CVE-2026-5996 — Command Injection in Totolink A7100RU?
CVE-2026-5996 is a critical vulnerability allowing remote command execution on Totolink A7100RU routers via manipulation of the tty_server parameter in /cgi-bin/cstecgi.cgi.
Am I affected by CVE-2026-5996 in Totolink A7100RU?
You are affected if your Totolink A7100RU router is running firmware versions 7.4cu.2313b20191024–7.4cu.2313b20191024 and has not been updated.
How do I fix CVE-2026-5996 in Totolink A7100RU?
A fix is pending. Mitigate by implementing WAF rules, strict input validation, and monitoring router logs. Upgrade to the patched firmware when available.
Is CVE-2026-5996 being actively exploited?
The vulnerability has been publicly disclosed, increasing the likelihood of exploitation. Active exploitation is possible.
Where can I find the official Totolink advisory for CVE-2026-5996?
Refer to the Totolink security advisory page for updates on CVE-2026-5996 and the availability of a firmware patch.