Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

658+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-6114: Totolink A7100RU OS Command Injection via setNetworkCfg
CVE-2026-6114: Totolink A7100RU OS Command Injection via setNetworkCfg

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-6114

CVE-2026-6114: Totolink A7100RU OS Command Injection via setNetworkCfg

CVE-2026-6114 is a critical OS command injection vulnerability (CVSS 9.8) in the Totolink A7100RU router's setNetworkCfg function, exploitable remotely without authentication via the proto parameter.

Dylan H.

Security Team

April 12, 2026
3 min read

Affected Products

  • Totolink A7100RU firmware 7.4cu.2313_b20191024

Overview

CVE-2026-6114 is a critical-severity OS command injection vulnerability in the Totolink A7100RU router (firmware 7.4cu.2313_b20191024). The flaw is found in the setNetworkCfg function within the /cgi-bin/cstecgi.cgi CGI handler. The proto parameter is not sanitized before being used in a shell command, allowing unauthenticated remote code execution.

FieldDetails
CVE IDCVE-2026-6114
CVSS Score9.8 (Critical)
Attack VectorNetwork
AuthenticationNone required
Published2026-04-12
Affected ProductTotolink A7100RU 7.4cu.2313_b20191024

Vulnerability Details

The setNetworkCfg function handles network protocol configuration on the router. The proto parameter — intended to specify a network protocol type — is passed unsanitized to a system command. By injecting shell metacharacters into this parameter, a remote attacker achieves arbitrary OS command execution.

No authentication is required to reach this endpoint, making exploitation trivial for any attacker with HTTP access to the router.

Affected Component

  • Function: setNetworkCfg
  • File: /cgi-bin/cstecgi.cgi
  • Parameter: proto
  • Injection Type: OS command injection
  • Exploit publicly available: Yes

Context: Systemic CGI Handler Flaws

CVE-2026-6114 is one of four simultaneous OS command injection CVEs disclosed for this firmware version, all in different setXxxCfg functions within the same CGI handler:

CVEFunctionParameter
CVE-2026-6112setRadvdCfgmaxRtrAdvInterval
CVE-2026-6113setTtyServiceCfgttyEnable
CVE-2026-6114setNetworkCfgproto
CVE-2026-6115setAppCfgenable

This pattern strongly indicates a systemic failure to validate user-supplied input throughout the CGI handler, rather than isolated coding errors.

Impact

An unauthenticated attacker can achieve root-level command execution, enabling:

  • Complete device compromise and persistent backdoor installation
  • Theft of stored network credentials (WPA keys, PPPoE passwords)
  • Traffic interception and DNS manipulation against LAN clients
  • Botnet enrollment — Totolink routers have historically been targeted by Mirai variants

Affected Versions

ProductFirmwareStatus
Totolink A7100RU7.4cu.2313_b20191024Vulnerable

Remediation

Vendor patch status was unconfirmed at publication. Apply these mitigations immediately:

  1. Isolate the management interface — Do not expose router management to untrusted networks or the public internet.
  2. Enable firewall rules — Block inbound connections to port 80/443 from non-LAN sources.
  3. Review router logs — Check for anomalous CGI requests targeting /cgi-bin/cstecgi.cgi.
  4. Disable unused services — Reduce the attack surface by disabling services like remote management.
  5. Replace unsupported hardware — Given the number of simultaneous CVEs, firmware quality is suspect; evaluate replacement with a supported device.

References

  • NVD Entry — CVE-2026-6114
  • Related: CVE-2026-6112 — setRadvdCfg injection
  • Related: CVE-2026-6113 — setTtyServiceCfg injection
  • Related: CVE-2026-6115 — setAppCfg injection
#CVE#Totolink#Router#Command Injection#IoT#Critical

Related Articles

CVE-2026-6112: Totolink A7100RU OS Command Injection via setRadvdCfg

A critical OS command injection vulnerability (CVSS 9.8) in Totolink A7100RU firmware allows unauthenticated remote attackers to execute arbitrary commands via the maxRtrAdvInterval parameter in the CGI handler.

3 min read

CVE-2026-6113: Totolink A7100RU OS Command Injection via setTtyServiceCfg

A critical OS command injection flaw (CVSS 9.8) in Totolink A7100RU enables remote unauthenticated attackers to execute arbitrary commands by manipulating the ttyEnable parameter in the CGI web handler.

2 min read

CVE-2026-6115: Totolink A7100RU OS Command Injection via setAppCfg

CVE-2026-6115 describes a critical OS command injection vulnerability (CVSS 9.8) in the Totolink A7100RU router, exploitable remotely and without credentials via the enable parameter of the setAppCfg CGI function.

3 min read
Back to all Security Alerts