CVE-2026-6113
Published: 12 April 2026
Description
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTtyServiceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument ttyEnable leads to os command injection. The attack…
more
can be launched remotely. The exploit has been disclosed publicly and may be used.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents OS command injection by requiring validation and sanitization of the ttyEnable argument in the vulnerable setTtyServiceCfg CGI function.
Addresses the specific command injection flaw in Totolink A7100RU firmware version 7.4cu.2313_b20191024 through timely flaw remediation and patching.
Monitors and controls remote network access to the vulnerable /cgi-bin/cstecgi.cgi endpoint, blocking unauthenticated exploitation attempts.
Security SummaryAI
CVE-2026-6113 is an OS command injection vulnerability in the Totolink A7100RU router firmware version 7.4cu.2313_b20191024. The flaw affects the setTtyServiceCfg function within the /cgi-bin/cstecgi.cgi file of the CGI Handler component, where manipulation of the ttyEnable argument enables command injection. Published on 2026-04-12, it is associated with CWE-77 and CWE-78, earning a CVSS v3.1 base score of 9.8.
Unauthenticated remote attackers can exploit this vulnerability with low complexity and no user interaction required (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By crafting malicious requests to the vulnerable endpoint, attackers can execute arbitrary operating system commands on the device, potentially achieving full control and high impacts on confidentiality, integrity, and availability.
VulDB advisories (vuldb.com/vuln/356973 and related pages) document the issue and its CTI context, while a GitHub repository (github.com/Litengzheng/vuldb_new/blob/main/A7100RU/vul_178/README.md) discloses a public exploit that may be used. The vendor site (totolink.net) is referenced, but no specific patches or mitigations are detailed in the provided information.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote OS command injection via public-facing CGI endpoint on router enables T1190 (Exploit Public-Facing Application) and facilitates arbitrary Unix shell command execution (T1059.004).