No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument mode leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. | |
| Title | Totolink A7100RU CGI cstecgi.cgi setWiFiAclRules os command injection | |
| First Time appeared |
Totolink
Totolink a7100ru Firmware |
|
| Weaknesses | CWE-77 CWE-78 |
|
| CPEs | cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink a7100ru Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-09T20:30:15.179Z
Reserved: 2026-04-09T12:11:50.100Z
Link: CVE-2026-5978
No data.
Status : Received
Published: 2026-04-09T21:16:13.727
Modified: 2026-04-09T21:16:13.727
Link: CVE-2026-5978
No data.
OpenCVE Enrichment
No data.