Cyber Posture

CVE-2026-7202

Critical

Published: 28 April 2026

Published
28 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0125 79.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2026-7202 is an OS command injection vulnerability in the Totolink A8000RU router running firmware version 7.1cu.643_b20200521. It affects the setWiFiWpsStart function within the /cgi-bin/cstecgi.cgi CGI handler component, where manipulation of the wscDisabled argument enables arbitrary command execution. The issue is classified under CWE-77 (Command Injection) and CWE-78 (OS Command Injection), with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility and lack of prerequisites.

Any remote attacker can exploit this vulnerability without authentication by sending a crafted request to the affected CGI endpoint, potentially achieving full compromise of the device. Successful exploitation grants high-impact privileges, allowing confidentiality breaches, integrity modifications, and availability disruptions through injected OS commands on the underlying system.

Advisories from VulDB detail the vulnerability (entries 359802 and related CTI) and note public disclosure of an exploit via a GitHub repository containing a README for the A8000RU vulnerability. The manufacturer's site (totolink.net) is referenced, but no specific patches or mitigations are outlined in the available information; practitioners should check for firmware updates and apply network segmentation to exposed devices.

Details

CWE(s)
CWE-77CWE-78

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

CVE enables unauthenticated remote exploitation of a public-facing web application (T1190) leading to arbitrary OS command execution on a likely Unix/Linux-based router (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References