Cyber Posture

CVE-2026-7152

Critical

Published: 27 April 2026

Published
27 April 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0125 79.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2026-7152 is an OS command injection vulnerability affecting the Totolink A8000RU router running firmware version 7.1cu.643_b20200521. The issue resides in the setTelnetCfg function within the /cgi-bin/cstecgi.cgi file of the CGI Handler component, where manipulation of the telnet_enabled argument enables arbitrary command execution. Published on 2026-04-27, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWEs-77 (Command Injection) and CWE-78 (OS Command Injection).

The vulnerability can be exploited remotely by unauthenticated attackers with network access, requiring low complexity and no user interaction. Successful exploitation allows attackers to inject and execute arbitrary operating system commands, potentially resulting in high-impact confidentiality, integrity, and availability compromises, such as full router compromise, data exfiltration, or persistent access.

Advisories from VulDB detail the vulnerability (vuln/359751) and provide a submission entry (submit/801138), while a GitHub repository (Litengzheng/vuldb_new2) hosts a publicly available exploit in its README.md file. The Totolink vendor website (totolink.net) is referenced, though specific patch details are not outlined in the available sources.

Details

CWE(s)
CWE-77CWE-78

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated remote OS command injection via public-facing router web CGI directly enables exploitation of public-facing application (T1190) and facilitates arbitrary Unix shell command execution (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References