Description
A vulnerability was detected in Totolink A7000R 4.1cu.4154. This affects the function setUnloadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument plugin_name results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.343231
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.343231
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.739713
Exploit, Third Party Advisory exploit
https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/01_RCE_setUnloadUserData_RCE.md
Exploit, Third Party Advisory exploit
https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/01_RCE_setUnloadUserData_RCE.md#poc
Product product
https://www.totolink.net/
Scores
CVSS v3
6.3
EPSS
0.0059
EPSS Percentile
69.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-74
CWE-77
Status
published
Products (1)
totolink/a7000r_firmware
4.1cu.4154
Published
Jan 28, 2026
Tracked Since
Feb 18, 2026