Totolink A8000RU Critical OS Command Injection (CVE-2026-7202)
The National Vulnerability Database has disclosed a critical OS command injection vulnerability, CVE-2026-7202, affecting Totolink A8000RU routers running firmware version 7.1cu.643_b20200521. This flaw exists within the setWiFiWpsStart function of the /cgi-bin/cstecgi.cgi component.
Attackers can exploit this vulnerability by manipulating the wscDisabled argument, leading to remote code execution. The severity is rated as 9.8 (CRITICAL) on the CVSS scale, indicating a high potential for impact without requiring authentication or user interaction. The exploit code has been publicly disclosed, significantly increasing the immediate risk for unpatched devices.
This is a classic perimeter compromise scenario. Given the public disclosure, any Totolink A8000RU device exposed to the internet with the affected firmware is a sitting duck. Attackers will leverage this for initial access, network pivoting, and establishing persistent footholds, turning a simple router into a gateway to internal networks.
What This Means For You
- If your organization uses Totolink A8000RU routers, especially in internet-facing deployments, you need to identify and isolate these devices immediately. Verify your firmware version against 7.1cu.643_b20200521 and seek vendor advisories for patches or mitigation steps. Assume compromise if these devices are unpatched and exposed; conduct forensic analysis to detect unauthorized access.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7202 Totolink A8000RU OS Command Injection via setWiFiWpsStart
title: CVE-2026-7202 Totolink A8000RU OS Command Injection via setWiFiWpsStart
id: scw-2026-04-28-ai-1
status: experimental
level: critical
description: |
This rule detects attempts to exploit CVE-2026-7202 by targeting the setWiFiWpsStart function in Totolink A8000RU devices. It specifically looks for requests to /cgi-bin/cstecgi.cgi with the 'setWiFiWpsStart' function and the 'wscDisabled' parameter, followed by characters indicative of command injection (e.g., ';', '|', '&&', '||'). This is a critical initial access vulnerability.
author: SCW Feed Engine (AI-generated)
date: 2026-04-28
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7202/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/cgi-bin/cstecgi.cgi'
cs-uri-query|contains:
- 'setWiFiWpsStart'
cs-uri-query|contains:
- 'wscDisabled='
selection_command_injection:
cs-uri-query|contains:
- 'wscDisabled=;'
- 'wscDisabled=|'
- 'wscDisabled= &&'
- 'wscDisabled= ||'
condition: selection AND selection_command_injection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7202 | Command Injection | Totolink A8000RU version 7.1cu.643_b20200521 |
| CVE-2026-7202 | Command Injection | Vulnerable component: CGI Handler |
| CVE-2026-7202 | Command Injection | Vulnerable file: /cgi-bin/cstecgi.cgi |
| CVE-2026-7202 | Command Injection | Vulnerable function: setWiFiWpsStart |
| CVE-2026-7202 | Command Injection | Manipulation of argument: wscDisabled |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 28, 2026 at 04:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.