Critical RCE Hits Totolink Routers: Patch Your A7100RU Now
The National Vulnerability Database (NVD) has disclosed a critical remote code execution (RCE) vulnerability, CVE-2026-6195, affecting Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. This isn’t some low-impact fluff; we’re talking about a CVSS score of 9.8, making it an immediate, high-priority threat.
The vulnerability stems from an OS command injection flaw within the setPasswordCfg function of the /cgi-bin/cstecgi.cgi component. Specifically, manipulation of the admpass argument allows an unauthenticated attacker to inject and execute arbitrary operating system commands. The NVD notes that exploit details are publicly available, meaning this isn’t just theoretical – it’s actively weaponizable and likely already being leveraged in the wild. This kind of vulnerability on a network edge device is a dream for attackers, offering a direct path into a network.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6195
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6195 | Command Injection | Totolink A7100RU version 7.4cu.2313_b20191024 |
| CVE-2026-6195 | Command Injection | Vulnerable component: CGI Handler |
| CVE-2026-6195 | Command Injection | Vulnerable file: /cgi-bin/cstecgi.cgi |
| CVE-2026-6195 | Command Injection | Vulnerable function: setPasswordCfg |
| CVE-2026-6195 | Command Injection | Vulnerable argument: admpass |