CVE-2026-5994
Published: 10 April 2026
Description
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This issue affects the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument telnet_enabled results in os command injection. The attack is…
more
possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Mitigating Controls (NIST 800-53 r5)AI
Directly validates and sanitizes the telnet_enabled argument in the setTelnetCfg CGI function to prevent OS command injection exploitation.
Requires timely identification, reporting, and patching of the specific command injection flaw in Totolink A7100RU firmware version 7.4cu.2313_b20191024.
Mandates identification and authentication for non-organizational users accessing the remotely exploitable CGI handler, blocking unauthenticated remote attacks.
Security SummaryAI
CVE-2026-5994 is an OS command injection vulnerability (CWE-77, CWE-78) affecting the Totolink A7100RU router on firmware version 7.4cu.2313_b20191024. The issue exists in the setTelnetCfg function of the /cgi-bin/cstecgi.cgi file within the CGI Handler component, where manipulation of the telnet_enabled argument enables arbitrary command execution.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), making it remotely exploitable over the network with low complexity, no privileges, and no user interaction required. Any unauthenticated remote attacker can inject and execute OS commands on the device, potentially achieving full compromise with high impacts to confidentiality, integrity, and availability.
Advisories from VulDB detail the vulnerability at https://vuldb.com/vuln/356548 and related pages, while the vendor site https://www.totolink.net/ provides support resources. A public exploit is available at https://github.com/Litengzheng/vuldb_new/blob/main/A7100RU/vul_166/README.md, heightening the risk of active exploitation.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote OS command injection via public-facing router CGI directly enables exploitation of public-facing application (T1190) and facilitates arbitrary command execution on network device CLI (T1059.008).