Platform
linux
Component
totolink-a7100ru
Opgelost in
7.4.1
CVE-2026-5851 represents a critical Command Injection vulnerability identified in the Totolink A7100RU router. This flaw allows attackers to inject arbitrary operating system commands, potentially granting them complete control over the device. The vulnerability specifically affects versions 7.4cu.2313b20191024–7.4cu.2313b20191024, and a fix is now available to mitigate this risk.
A critical security vulnerability has been discovered in the Totolink A7100RU router, version 7.4cu.2313_b20191024 (CVE-2026-5851). This flaw resides within the setUPnPCfg function of the /cgi-bin/cstecgi.cgi file, a component of the CGI Handler. A remote attacker can exploit this vulnerability by manipulating the enable argument, leading to operating system command injection. The vulnerability's severity is extremely high (CVSS 9.8) due to its ease of remote exploitation and the potential for unauthorized access to the device and the network it connects to. The public release of the exploit further exacerbates the risk, enabling malicious actors to easily launch attacks.
The vulnerability is located in the /cgi-bin/cstecgi.cgi file, specifically within the setUPnPCfg function. The enable argument is susceptible to command injection. An attacker can send a malicious HTTP request to the router, manipulating this argument to execute arbitrary commands on the underlying operating system. The remote nature of the exploitation, combined with the public availability of the exploit, makes this vulnerability a significant risk to Totolink A7100RU users. The lack of an official fix increases the urgency of implementing mitigation measures.
Exploit Status
EPSS
1.25% (79% percentiel)
CISA SSVC
CVSS-vector
Currently, there is no official fix provided by Totolink for this vulnerability. The primary recommendation is to update the router's firmware to a more recent version, if available. If no update is available, isolating the router from the public network, restricting access only to trusted devices, is advised. Implementing strict firewall rules that block external access to the /cgi-bin/cstecgi.cgi file can mitigate the risk, although it's not a complete solution. Monitoring the network for suspicious activity is crucial. Consider replacing the router with a model that has a stronger security track record and regular firmware updates.
Actualice el firmware del dispositivo Totolink A7100RU a una versión corregida por el fabricante. Consulte el sitio web oficial de Totolink para obtener la última versión de firmware y las instrucciones de actualización.
Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.
It's a unique identifier for this security vulnerability, making it easier to track and reference.
It's an attack technique that allows an attacker to execute arbitrary commands on the device's operating system.
Isolate the router from the internet and limit access only to trusted devices. Implement strict firewall rules.
Currently, there are no specific tools available, but monitoring the network for unusual activity can be helpful.
An official solution has not been announced. Monitor the Totolink website for updates.
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.