Description
A weakness has been identified in Totolink A7000R 4.1cu.4154. The impacted element is the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument FileName can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Problem types
Product status
Timeline
| 2026-01-29: | Advisory disclosed |
| 2026-01-29: | VulDB entry created |
| 2026-01-30: | VulDB entry last update |
Credits
xuanyu (VulDB User)
References
github.com/...OTOLINK/A7000R/03_RCE_setUploadUserData_RCE.md
vuldb.com/?id.343373 (VDB-343373 | Totolink A7000R cstecgi.cgi setUploadUserData command injection)
vuldb.com/?ctiid.343373 (VDB-343373 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.740760 (Submit #740760 | TOTOLINK A7000R V4.1cu.4154 Command Injection)
github.com/...OTOLINK/A7000R/03_RCE_setUploadUserData_RCE.md
github.com/...OTOLINK/A7000R/03_RCE_setUploadUserData_RCE.md
www.totolink.net/