Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-7139

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mode causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

View on NVD

Analysis

This is a remote command injection vulnerability in Totolink A8000RU routers. While the flaw is critical and allows unauthenticated RCE, this specific consumer router brand is not relevant to software development or typical enterprise infrastructure handled by the community.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-77CWE-78

EPSS

Probability of exploitation (next 30 days): 0.0125 (1.3%)
Percentile: 79.5%
EPSS: 2026-05-06

Technical description

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mode causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

Published: 4/27/2026, 5:16:45 PM
Last modified: 4/27/2026, 6:35:53 PM

References

HomeEventsBlogResourcesTeam