Command Injection Vulnerability in Totolink A7100RU Products
CVE-2026-5993
Key Information:
Badges
What is CVE-2026-5993?
A command injection vulnerability exists in the Totolink A7100RU router's CGI Handler component, specifically in the setWiFiGuestCfg function. By manipulating the wifiOff argument within the /cgi-bin/cstecgi.cgi file, an attacker can execute arbitrary commands on the underlying operating system. This vulnerability can be exploited remotely, posing significant security risks to affected devices. Publicly available exploits further increase the urgency for users to apply necessary patches or mitigate exposures.
Affected Version(s)
A7100RU 7.4cu.2313_b20191024
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
