


Perceptive Security
SOC/SIEM Consultancy

A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi of the component C…
Published:
8 april 2026 om 22:00:00
Alert date:
9 april 2026 om 08:02:02
Source:
nvd.nist.gov
Mobile & IoT, Network Infrastructure
A critical OS command injection vulnerability has been identified in Totolink A7100RU router firmware version 7.4cu.2313_b20191024. The vulnerability affects the setIptvCfg function in the CGI handler component, specifically through manipulation of the igmpVer parameter in the /cgi-bin/cstecgi.cgi file. The vulnerability can be exploited remotely, allowing attackers to execute arbitrary OS commands on the affected device. Public exploits are available, significantly increasing the risk of active exploitation. This represents a high-severity security weakness in IoT network infrastructure that could lead to complete device compromise.
Technical details
Mitigation steps:
Affected products:
Totolink A7100RU
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-5852
https://github.com/Litengzheng/vuldb_new/blob/main/A7100RU/vul_158/README.md
https://vuldb.com/submit/791272
https://vuldb.com/vuln/356378
https://vuldb.com/vuln/356378/cti
https://www.totolink.net/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
