{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-6112","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-11T08:17:59.227Z","datePublished":"2026-04-12T02:45:13.694Z","dateUpdated":"2026-04-15T15:17:02.716Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-12T02:45:13.694Z"},"title":"Totolink A7100RU CGI cstecgi.cgi setRadvdCfg os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"Totolink","product":"A7100RU","versions":[{"version":"7.4cu.2313_b20191024","status":"affected"}],"cpes":["cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*"],"modules":["CGI Handler"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument maxRtrAdvInterval causes os command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"CRITICAL"}},{"cvssV3_1":{"version":"3.1","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV3_0":{"version":"3.0","baseScore":9.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV2_0":{"version":"2.0","baseScore":10,"vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-11T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-11T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-11T10:23:19.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LtzHust2 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/356972","name":"VDB-356972 | Totolink A7100RU CGI cstecgi.cgi setRadvdCfg os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/356972/cti","name":"VDB-356972 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/792245","name":"Submit #792245 | Totolink A7100RU 7.4cu.2313_b20191024 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/Litengzheng/vuldb_new/blob/main/A7100RU/vul_177/README.md","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-15T15:16:52.740547Z","id":"CVE-2026-6112","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-15T15:17:02.716Z"}}]}}