Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

658+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-6115: Totolink A7100RU OS Command Injection via setAppCfg
CVE-2026-6115: Totolink A7100RU OS Command Injection via setAppCfg

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-6115

CVE-2026-6115: Totolink A7100RU OS Command Injection via setAppCfg

CVE-2026-6115 describes a critical OS command injection vulnerability (CVSS 9.8) in the Totolink A7100RU router, exploitable remotely and without credentials via the enable parameter of the setAppCfg CGI function.

Dylan H.

Security Team

April 12, 2026
3 min read

Affected Products

  • Totolink A7100RU firmware 7.4cu.2313_b20191024

Overview

CVE-2026-6115 is the fourth in a cluster of critical OS command injection vulnerabilities disclosed on 2026-04-12 for the Totolink A7100RU router firmware 7.4cu.2313_b20191024. This flaw is in the setAppCfg function of the /cgi-bin/cstecgi.cgi handler. Manipulation of the enable parameter results in OS-level command execution, remotely and without authentication.

FieldDetails
CVE IDCVE-2026-6115
CVSS Score9.8 (Critical)
Attack VectorNetwork
AuthenticationNone required
Published2026-04-12
Affected ProductTotolink A7100RU 7.4cu.2313_b20191024

Vulnerability Details

The setAppCfg function manages application-level feature toggles on the router. The enable parameter is passed to a shell function without sanitization. An attacker can inject arbitrary OS commands by embedding shell syntax into the value, gaining code execution on the device.

The absence of authentication on this CGI endpoint means exploitation requires only network access — no credentials, session tokens, or prior reconnaissance.

Affected Component

  • Function: setAppCfg
  • File: /cgi-bin/cstecgi.cgi
  • Parameter: enable
  • Injection Type: OS command injection
  • Exploit publicly available: Yes

Broader Disclosure Pattern

All four CVEs in this batch (CVE-2026-6112 through CVE-2026-6115) were published on the same date and affect the same firmware. The consistent pattern — unsanitized parameters passed to system calls in setXxxCfg functions — suggests that a single researcher or automated scanner audited the CGI handler and found multiple injection points in rapid succession.

CVEFunctionParameter
CVE-2026-6112setRadvdCfgmaxRtrAdvInterval
CVE-2026-6113setTtyServiceCfgttyEnable
CVE-2026-6114setNetworkCfgproto
CVE-2026-6115setAppCfgenable

This signals that additional undisclosed injection points may exist in the same codebase.

Impact

Successful exploitation of CVE-2026-6115 gives an attacker full control over the router at root level. Combined with the other three CVEs, the Totolink A7100RU on firmware 7.4cu.2313_b20191024 must be considered fully compromised if reachable from an untrusted network. Likely outcomes include:

  • Persistent backdoor installation surviving reboots
  • Credential harvesting (Wi-Fi PSKs, admin passwords, ISP credentials)
  • DNS hijacking to redirect LAN clients to malicious infrastructure
  • Botnet integration (Mirai and its variants actively target Totolink routers)
  • Lateral movement into the local network

Affected Versions

ProductFirmwareStatus
Totolink A7100RU7.4cu.2313_b20191024Vulnerable

No patch was confirmed at publication. Visit the Totolink support site for the latest firmware availability.

Remediation

Given the severity and number of simultaneous CVEs, treat this device as critically exposed:

  1. Immediately restrict network access — Firewall the management interface (port 80/443) to LAN-only trusted hosts.
  2. Disable remote management — Confirm WAN-side management is disabled via the router admin panel.
  3. Check for compromise indicators — Review logs for unexpected CGI requests, outbound connections, or modified DNS settings.
  4. Apply firmware update when available — Monitor Totolink's site and install any patch that addresses these CVEs.
  5. Plan device replacement — Four simultaneous critical CVEs in one firmware version is a strong signal of poor code quality; replacement with a well-supported router is advised for environments where security matters.

References

  • NVD Entry — CVE-2026-6115
  • Related: CVE-2026-6112 — setRadvdCfg injection
  • Related: CVE-2026-6113 — setTtyServiceCfg injection
  • Related: CVE-2026-6114 — setNetworkCfg injection
#CVE#Totolink#Router#Command Injection#IoT#Critical

Related Articles

CVE-2026-6112: Totolink A7100RU OS Command Injection via setRadvdCfg

A critical OS command injection vulnerability (CVSS 9.8) in Totolink A7100RU firmware allows unauthenticated remote attackers to execute arbitrary commands via the maxRtrAdvInterval parameter in the CGI handler.

3 min read

CVE-2026-6113: Totolink A7100RU OS Command Injection via setTtyServiceCfg

A critical OS command injection flaw (CVSS 9.8) in Totolink A7100RU enables remote unauthenticated attackers to execute arbitrary commands by manipulating the ttyEnable parameter in the CGI web handler.

2 min read

CVE-2026-6114: Totolink A7100RU OS Command Injection via setNetworkCfg

CVE-2026-6114 is a critical OS command injection vulnerability (CVSS 9.8) in the Totolink A7100RU router's setNetworkCfg function, exploitable remotely without authentication via the proto parameter.

3 min read
Back to all Security Alerts