CVE-2026-5850
Published: 09 April 2026
Description
A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru leads to os command injection. Remote exploitation of the attack is possible.…
more
The exploit is publicly available and might be used.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the OS command injection vulnerability in the setVpnPassCfg function of /cgi-bin/cstecgi.cgi through timely patching of the Totolink A7100RU firmware.
Validates the pptpPassThru argument to prevent manipulation leading to OS command injection in the vulnerable CGI handler.
Controls network access to the exposed web management interface, mitigating remote unauthenticated exploitation of the command injection vulnerability.
Security SummaryAI
CVE-2026-5850 is an OS command injection vulnerability affecting the Totolink A7100RU router on firmware version 7.4cu.2313_b20191024. The issue resides in the setVpnPassCfg function within the /cgi-bin/cstecgi.cgi file of the CGI Handler component, where manipulation of the pptpPassThru argument enables command injection. Published on 2026-04-09, it is associated with CWE-77 and CWE-78.
Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network with low attack complexity. Successful exploitation grants high impacts on confidentiality, integrity, and availability, earning a CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), potentially allowing arbitrary command execution on the device.
Advisories on VULDB (including vuln/356376 and submit/791266) document the issue, while a GitHub repository at Litengzheng/vuldb_new provides a publicly available exploit. The Totolink vendor website at totolink.net should be consulted for any firmware updates or mitigation guidance.
The public availability of the exploit increases the risk of real-world attacks against unpatched Totolink A7100RU devices.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables exploitation of public-facing web application (T1190) leading to OS command injection on Unix-based router firmware (T1059.004).