Critical RCE Found in Totolink A7100RU Routers

Critical RCE Found in Totolink A7100RU Routers

The National Vulnerability Database has flagged a critical OS command injection vulnerability, identified as CVE-2026-6155, affecting Totolink A7100RU routers running firmware version 7.4cu.2313. This isn’t just a run-of-the-mill bug; it’s a 9.8 CVSS score, which means it’s about as bad as it gets.

The flaw resides within the setWanCfg function of the /cgi-bin/cstecgi.cgi file, specifically within the CGI Handler component. An attacker can manipulate the pppoeServiceName argument to inject OS commands. What makes this particularly nasty is that the attack can be launched remotely, and the exploit code is already public. This isn’t some theoretical scenario; it’s a live fire opportunity for threat actors looking to compromise network edge devices.

Command injection vulnerabilities like this are a goldmine for attackers, allowing them to execute arbitrary commands on the underlying operating system. For a router, this means potential full control: sniffing traffic, reconfiguring network settings, or even establishing a foothold for further internal network traversal. It’s a prime example of why proper input sanitization is non-negotiable in web-facing components.

Related ATT&CK Techniques

🛡️ Detection Rules

4 rules · 5 SIEM formats

4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-6155

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6155 Command Injection Totolink A7100RU version 7.4cu.2313
CVE-2026-6155 Command Injection Vulnerable component: CGI Handler
CVE-2026-6155 Command Injection Vulnerable file: /cgi-bin/cstecgi.cgi
CVE-2026-6155 Command Injection Vulnerable function: setWanCfg
CVE-2026-6155 Command Injection Vulnerable argument: pppoeServiceName

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs