CVE-2026-5995
OS Command Injection in Totolink A7100RU CGI Handler (Remote
Publication date: 2026-04-10
Last updated on: 2026-04-10
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| totolink | a7100ru | 7.4cu.2313_b20191024 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-5995 is a command injection vulnerability in the TOTOLINK A7100RU router, specifically in version 7.4cu.2313_b20191024. The issue exists in the CGI script cstecgi.cgi within the function that processes the lan_info parameter. This parameter is not properly sanitized before being used in a system command execution function, allowing an attacker to inject and execute arbitrary operating system commands remotely.
An attacker can exploit this by sending a crafted HTTP POST request containing a malicious lan_info value to the /cgi-bin/cstecgi.cgi endpoint. This leads to the router executing the injected commands, potentially resulting in full system compromise.
How can this vulnerability impact me? :
This vulnerability allows remote attackers to execute arbitrary operating system commands on the affected TOTOLINK A7100RU router without any authentication.
- Full system compromise of the router.
- Potential unauthorized control over network traffic passing through the router.
- Possibility of installing malware or creating persistent backdoors.
- Disruption of network services or interception of sensitive data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for suspicious HTTP POST requests sent to the /cgi-bin/cstecgi.cgi endpoint containing the lan_info parameter with potentially malicious payloads.
A practical detection method is to capture and inspect network traffic for POST requests targeting /cgi-bin/cstecgi.cgi with JSON payloads that include the lan_info parameter.
- Use a network packet capture tool like tcpdump or Wireshark to filter HTTP POST requests to /cgi-bin/cstecgi.cgi.
- Example tcpdump command to capture relevant traffic: tcpdump -i <interface> -A 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep -i 'POST /cgi-bin/cstecgi.cgi'
- Inspect captured HTTP POST payloads for the presence of the lan_info parameter containing suspicious command injection patterns, such as shell commands or URLs (e.g., wget).
- On the router itself, check running processes for unexpected commands like wget that could indicate exploitation.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable /cgi-bin/cstecgi.cgi endpoint to trusted networks only, such as by firewall rules or network segmentation.
Avoid exposing the TOTOLINK A7100RU router's management interface to untrusted networks or the internet.
Monitor the device for signs of compromise, such as unexpected processes or network connections.
If available, apply firmware updates or patches from the vendor that address this vulnerability.
As a temporary workaround, disable or restrict access to the CGI Handler component if possible.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows remote attackers to execute arbitrary operating system commands on the TOTOLINK A7100RU router, potentially leading to full system compromise.
Such a compromise could result in unauthorized access to sensitive data or disruption of network services, which may violate requirements of common standards and regulations like GDPR and HIPAA that mandate protection of personal and health information.
Therefore, if exploited, this vulnerability could negatively impact compliance by exposing protected data or causing service interruptions.