Critical RCE Found in Totolink A7100RU Routers
The National Vulnerability Database (NVD) has disclosed a critical remote code execution (RCE) vulnerability, CVE-2026-6132, affecting Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. This isn’t some theoretical flaw; it’s a nasty OS command injection that’s been publicly disclosed, meaning the bad guys likely already have it in their exploit kits.
According to NVD, the vulnerability resides within the setLedCfg function of the /cgi-bin/cstecgi.cgi file, specifically within the CGI Handler component. Manipulating the enable argument allows an unauthenticated attacker to inject arbitrary operating system commands. With a CVSS v3.1 score of 9.8, this vulnerability is squarely in the critical territory. It’s a textbook example of CWE-77 and CWE-78, highlighting the dangers of insufficient input validation when interacting with system commands. Remote exploitation is possible, which is always a red flag, as it means an attacker doesn’t need local network access to wreak havoc.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6132
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6132 | Command Injection | Totolink A7100RU version 7.4cu.2313_b20191024 |
| CVE-2026-6132 | Command Injection | Vulnerable component: CGI Handler |
| CVE-2026-6132 | Command Injection | Vulnerable file: /cgi-bin/cstecgi.cgi |
| CVE-2026-6132 | Command Injection | Vulnerable function: setLedCfg |
| CVE-2026-6132 | Command Injection | Vulnerable argument: enable |