Cyber Posture

CVE-2026-1548

MediumPublic PoC

Published: 28 January 2026

Published
28 January 2026
Modified
09 February 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0047 64.8th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

A flaw has been found in Totolink A7000R 4.1cu.4154. This impacts the function CloudACMunualUpdateUserdata of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument url causes command injection. The attack can be initiated remotely. The exploit has been published and may…

more

be used.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation and sanitization of the 'url' argument in the CloudACMunualUpdateUserdata CGI function to block command injection attacks.

prevent

Mandates identification, prioritization, and remediation of the specific command injection flaw in Totolink A7000R firmware 4.1cu.4154.

preventdetect

Requires vulnerability scanning to identify and remediate instances of CVE-2026-1548 in deployed router systems.

Security SummaryAI

CVE-2026-1548 is a command injection vulnerability in the Totolink A7000R router running firmware version 4.1cu.4154. The flaw affects the CloudACMunualUpdateUserdata function within the /cgi-bin/cstecgi.cgi script, where manipulation of the 'url' argument enables arbitrary command execution. Associated with CWE-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-77 (Command Injection), it carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

The vulnerability can be exploited remotely by an attacker with low privileges, such as an authenticated user, requiring no user interaction. Successful exploitation allows command injection, potentially granting limited access to confidential data, minor integrity disruptions, and low-level availability impacts on the affected device.

Advisories referenced in VulDB entries (ctiid.343232, id.343232) and related submissions document the issue, while GitHub repositories provide detailed proof-of-concept exploits for the RCE via CloudACMunualUpdateUserdata. No specific patches or mitigation steps are detailed in the available references.

Published on January 28, 2026, the exploit has been publicly released and may be actively used against vulnerable Totolink A7000R devices.

Details

CWE(s)

Affected Products

totolink
a7000r firmware
4.1cu.4154

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.008 Network Device CLI Execution
Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads.
Why these techniques?

CVE enables remote exploitation of a public-facing web application (T1190) leading to command injection on a network device CLI (T1059.008).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References