OS Command Injection in Totolink A8000RU by Totolink
CVE-2026-7125
Key Information:
Badges
What is CVE-2026-7125?
A vulnerability exists in the Totolink A8000RU router, specifically in the setWiFiEasyCfg function within the CGI Handler component located at /cgi-bin/cstecgi.cgi. This issue allows an attacker to manipulate the merge argument, facilitating OS command injection. As a result, remote attackers could potentially exploit this vulnerability to execute arbitrary commands on the device. The exploit code is publicly available, raising concerns about the security of devices running the affected version.
Affected Version(s)
A8000RU 7.1cu.643_b20200521
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
