CVE-2026-7124: Critical OS Command Injection in Totolink A8000RU Routers
The National Vulnerability Database has disclosed CVE-2026-7124, a critical OS command injection vulnerability impacting Totolink A8000RU routers running firmware version 7.1cu.643_b20200521. This flaw exists within the setIpv6LanCfg function of the /cgi-bin/cstecgi.cgi component.
Attackers can exploit this vulnerability by manipulating the addrPrefixLen argument, leading to arbitrary OS command execution. Crucially, the attack can be launched remotely without authentication, making these devices prime targets for attackers seeking initial access into networks. With a CVSS score of 9.8, this vulnerability is deemed critical, and an exploit has already been publicly disclosed, increasing the immediate risk.
This isn’t just a theoretical bug; it’s a direct route to full device compromise. Adversaries can leverage this to establish persistent backdoors, pivot deeper into internal networks, or launch further attacks. Given the nature of router vulnerabilities, it’s highly probable that this will be integrated into automated scanning and exploitation tools by various threat actors.
What This Means For You
- If your organization uses Totolink A8000RU routers, you need to immediately identify all instances and check their firmware versions. Any device running 7.1cu.643_b20200521 or similar versions is at critical risk. Prioritize patching or isolating these devices. Assume compromise if you cannot confirm patching. This is a network perimeter vulnerability; its exploitation provides a direct foothold.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7124: OS Command Injection via setIpv6LanCfg on Totolink Routers
title: CVE-2026-7124: OS Command Injection via setIpv6LanCfg on Totolink Routers
id: scw-2026-04-27-ai-1
status: experimental
level: critical
description: |
Detects exploitation attempts against CVE-2026-7124 by looking for requests to the cgi-bin handler with the specific function setIpv6LanCfg and manipulation of the addrPrefixLen argument. The presence of 'ping' and a space within the query string are strong indicators of a command injection attempt targeting the router's OS.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7124/
tags:
- attack.execution
- attack.t1059.004
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/cgi-bin/cstecgi.cgi'
cs-uri-query|contains:
- 'setIpv6LanCfg'
cs-uri-query|contains:
- 'addrPrefixLen='
cs-uri-query|contains:
- 'ping'
cs-uri-query|contains:
- ' '
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7124 | Command Injection | Totolink A8000RU version 7.1cu.643_b20200521 |
| CVE-2026-7124 | Command Injection | Vulnerable file: /cgi-bin/cstecgi.cgi |
| CVE-2026-7124 | Command Injection | Vulnerable function: setIpv6LanCfg |
| CVE-2026-7124 | Command Injection | Vulnerable argument: addrPrefixLen |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 27, 2026 at 16:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.