Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-7125

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

View on NVD

Analysis

This vulnerability is an OS command injection in the firmware of a specific Totolink A8000RU router model. It is a vendor-specific IoT bug that does not impact the software development stack, Linux servers, or cloud infrastructure used by the community.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-77CWE-78

EPSS

Probability of exploitation (next 30 days): 0.0125 (1.3%)
Percentile: 79.5%
EPSS: 2026-05-06

Technical description

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

Published: 4/27/2026, 1:16:05 PM
Last modified: 4/27/2026, 6:36:42 PM

References

HomeEventsBlogResourcesTeam