CVE-2026-7037: Totolink A8000RU Critical OS Command Injection
The National Vulnerability Database has disclosed a critical OS command injection vulnerability, CVE-2026-7037, impacting Totolink A8000RU routers, specifically firmware version 7.1cu.643_b20200521. This flaw resides within the setVpnPassCfg function of the /cgi-bin/cstecgi.cgi component, where improper handling of the pptpPassThru argument allows for arbitrary OS command execution.
Rated with a CVSS score of 9.8 (CRITICAL), this vulnerability is remotely exploitable without authentication (AV:N/AC:L/PR:N/UI:N). The attacker’s calculus here is straightforward: gain full system control on an exposed edge device, likely as a stepping stone into internal networks or to establish persistent access for botnet operations. The public release of an exploit dramatically escalates the immediate risk.
This is a severe issue for any organization or individual still running the affected Totolink A8000RU model. Unauthenticated remote command injection on an internet-facing device is a gift for attackers. It bypasses perimeter defenses and grants deep access, making these routers prime targets for initial access brokers and nation-state actors alike.
What This Means For You
- If your organization uses Totolink A8000RU routers, especially version 7.1cu.643_b20200521, you must immediately identify and isolate these devices. Given the public exploit, assume compromise if unpatched and internet-facing. Replace or reconfigure affected routers to eliminate internet exposure until a patch is available. There is no time to waste on this one.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7037: Totolink A8000RU OS Command Injection via pptpPassThru
title: CVE-2026-7037: Totolink A8000RU OS Command Injection via pptpPassThru
id: scw-2026-04-26-ai-1
status: experimental
level: critical
description: |
Detects the specific OS command injection vulnerability in Totolink A8000RU (CVE-2026-7037) by looking for requests to '/cgi-bin/cstecgi.cgi' with the 'setVpnPassCfg' function and the 'pptpPassThru' parameter containing a 'cmd=' argument, indicating an attempt to inject OS commands.
author: SCW Feed Engine (AI-generated)
date: 2026-04-26
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7037/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/cgi-bin/cstecgi.cgi'
cs-uri-query|contains:
- 'setVpnPassCfg'
cs-uri-query|contains:
- 'pptpPassThru='
cs-uri-query|contains:
- 'cmd='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7037 | Command Injection | Totolink A8000RU 7.1cu.643_b20200521 |
| CVE-2026-7037 | Command Injection | Vulnerable function: setVpnPassCfg |
| CVE-2026-7037 | Command Injection | Vulnerable file: /cgi-bin/cstecgi.cgi |
| CVE-2026-7037 | Command Injection | Vulnerable argument: pptpPassThru |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 26, 2026 at 15:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.