CVE-2026-7241
Received Received - Intake
Remote OS Command Injection in Totolink A8000RU CGI Handler

Publication date: 2026-04-28

Last updated on: 2026-04-28

Assigner: VulDB

Description
A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiBasicCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument wifiOff results in os command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
totolink a8000ru 7.1cu.643_b20200521
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The CVE-2026-7241 vulnerability allows remote OS command injection on the TOTOLINK A8000RU router, potentially enabling attackers to execute arbitrary commands on the device.

Such a vulnerability could lead to unauthorized access, data breaches, or disruption of service, which may impact compliance with standards and regulations like GDPR and HIPAA that require protection of personal and sensitive data.

However, the provided information does not explicitly describe the direct effects on compliance with these standards.


Can you explain this vulnerability to me?

CVE-2026-7241 is a command injection vulnerability found in the TOTOLINK A8000RU router, version 7.1cu.643_b20200521. It exists in the CGI Handler component, specifically in the function setWiFiBasicCfg within the /cgi-bin/cstecgi.cgi file.

The vulnerability occurs when the router processes a user-supplied parameter named "wifiOff" along with another parameter "addEffect" set to 1. The "wifiOff" value is passed to a function that inserts it into a buffer without proper sanitization. This buffer is then executed as an OS command, allowing an attacker to run arbitrary commands on the router remotely.

A proof of concept shows that by sending a crafted POST request with the "wifiOff" parameter set to a command like `ls>./setWiFiBasicCfg.txt`, the router executes this command, creating a file with the directory listing, confirming the command injection.


How can this vulnerability impact me? :

This vulnerability allows remote attackers to execute arbitrary operating system commands on the affected router without any authentication.

Such unauthorized command execution can lead to full compromise of the device, including but not limited to: unauthorized access to network traffic, modification or disruption of network configurations, installation of malicious software, and potential pivoting to other devices on the network.

Because the exploit is publicly available, attackers can easily leverage this vulnerability to gain control over the router, leading to significant security risks for users.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending a crafted POST request to the /cgi-bin/cstecgi.cgi endpoint of the TOTOLINK A8000RU router, targeting the setWiFiBasicCfg function with manipulated parameters.

Specifically, setting the "wifiOff" parameter to an OS command such as `ls>./setWiFiBasicCfg.txt` and the "addEffect" parameter to 1 in the POST request can trigger command execution if the device is vulnerable.

If successful, the router will execute the command and create a file named setWiFiBasicCfg.txt containing the directory listing, confirming the presence of the vulnerability.

  • Use a tool like curl to send the following POST request to test for the vulnerability:
  • curl -X POST http://[router_ip]/cgi-bin/cstecgi.cgi -d "wifiOff=ls>./setWiFiBasicCfg.txt&addEffect=1"
  • Check the router's file system for the presence of setWiFiBasicCfg.txt to confirm command execution.

What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-7241 vulnerability in the Totolink A8000RU router, immediate steps include restricting remote access to the affected CGI handler endpoint (/cgi-bin/cstecgi.cgi) to prevent exploitation.

Additionally, disabling or limiting the use of the vulnerable function setWiFiBasicCfg or the parameters 'wifiOff' and 'addEffect' if possible can reduce risk.

Applying any available firmware updates or patches from the vendor that address this command injection vulnerability is strongly recommended once they become available.

As a temporary workaround, consider isolating the device from untrusted networks or placing it behind a firewall to limit exposure.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart