Totolink A8000RU Faces Critical Remote Command Injection (CVE-2026-7155)
A critical security vulnerability, identified as CVE-2026-7155, has been disclosed in Totolink A8000RU firmware version 7.1cu.643_b20200521. This flaw resides within the setLoginPasswordCfg function of the /cgi-bin/cstecgi.cgi component, specifically through the manipulation of the admpass argument. The National Vulnerability Database attributes this to an OS command injection, a dangerous class of vulnerability often leading to full system compromise.
This is a severe issue. National Vulnerability Database has assigned CVE-2026-7155 a CVSSv3.1 score of 9.8 (CRITICAL), indicating that it is easily exploitable remotely without authentication (AV:N, PR:N, UI:N). The public disclosure of an exploit further raises the alarm. Attackers can leverage this to execute arbitrary commands on affected devices, potentially gaining complete control over the router and, by extension, the network it manages. This translates directly to network persistence, data exfiltration, or launching further attacks from within the victim’s infrastructure.
For defenders, this means any Totolink A8000RU devices running the specified firmware are effectively wide open. The attacker’s calculus is straightforward: find these devices, exploit the publicly available proof-of-concept, and gain a foothold. This isn’t theoretical; it’s a direct threat that needs immediate attention. Command injection vulnerabilities are a gift for adversaries, offering a low-effort path to high-impact results, aligning with CWE-77 and CWE-78.
What This Means For You
- If your organization uses Totolink A8000RU routers, specifically firmware version 7.1cu.643_b20200521, you must prioritize patching or isolating these devices immediately. This remote command injection (CVE-2026-7155) allows unauthenticated attackers to execute arbitrary code, leading to complete device compromise. Audit your network for these specific devices and ensure they are either updated or removed from internet-facing positions.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7155 Totolink A8000RU Command Injection via setLoginPasswordCfg
title: CVE-2026-7155 Totolink A8000RU Command Injection via setLoginPasswordCfg
id: scw-2026-04-27-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-7155 by targeting the setLoginPasswordCfg function in Totolink A8000RU devices. The rule specifically looks for requests to /cgi-bin/cstecgi.cgi with the 'setLoginPasswordCfg' parameter and the 'admpass' argument, combined with characters commonly used in OS command injection payloads (&&, ;, |, $, `).
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7155/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/cgi-bin/cstecgi.cgi'
cs-uri-query|contains:
- 'setLoginPasswordCfg'
cs-uri-query|contains:
- 'admpass='
selection_command_injection:
cs-uri-query|contains:
- '&&'
cs-uri-query|contains:
- ';'
cs-uri-query|contains:
- '|'
cs-uri-query|contains:
- '$'
cs-uri-query|contains:
- '`'
condition: selection AND selection_command_injection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7155 | Command Injection | Totolink A8000RU version 7.1cu.643_b20200521 |
| CVE-2026-7155 | Command Injection | Vulnerable file: /cgi-bin/cstecgi.cgi |
| CVE-2026-7155 | Command Injection | Vulnerable function: setLoginPasswordCfg |
| CVE-2026-7155 | Command Injection | Vulnerable argument: admpass |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 28, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.