Description
A vulnerability was detected in Totolink A7000R 4.1cu.4154. This affects the function setUnloadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument plugin_name results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
Problem types
Product status
Timeline
| 2026-01-28: | Advisory disclosed |
| 2026-01-28: | VulDB entry created |
| 2026-02-09: | VulDB entry last update |
Credits
xuanyu (VulDB User)
References
github.com/...OTOLINK/A7000R/01_RCE_setUnloadUserData_RCE.md
github.com/...OTOLINK/A7000R/01_RCE_setUnloadUserData_RCE.md
vuldb.com/?id.343231 (VDB-343231 | Totolink A7000R cstecgi.cgi setUnloadUserData command injection)
vuldb.com/?ctiid.343231 (VDB-343231 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.739713 (Submit #739713 | TOTOLINK A7000R V4.1cu.4154 Command Injection)
github.com/...OTOLINK/A7000R/01_RCE_setUnloadUserData_RCE.md
github.com/...OTOLINK/A7000R/01_RCE_setUnloadUserData_RCE.md
www.totolink.net/