{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-6195","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-13T08:45:05.331Z","datePublished":"2026-04-13T17:30:13.953Z","dateUpdated":"2026-04-13T18:00:15.007Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-13T17:30:13.953Z"},"title":"Totolink A7100RU CGI cstecgi.cgi setPasswordCfg os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"Totolink","product":"A7100RU","versions":[{"version":"7.4cu.2313_b20191024","status":"affected"}],"cpes":["cpe:2.3:o:totolink:a7100ru_firmware:*:*:*:*:*:*:*:*"],"modules":["CGI Handler"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument admpass leads to os command injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"CRITICAL"}},{"cvssV3_1":{"version":"3.1","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV3_0":{"version":"3.0","baseScore":9.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV2_0":{"version":"2.0","baseScore":10,"vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-13T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-13T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-13T10:50:26.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LtzHust (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/357117","name":"VDB-357117 | Totolink A7100RU CGI cstecgi.cgi setPasswordCfg os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/357117/cti","name":"VDB-357117 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/797460","name":"Submit #797460 | Totolink A7100RU 7.4cu.2313_b20191024 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/Litengzheng/vuldb_new/blob/main/A7100RU/vul_198/README.md","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-13T17:59:38.574002Z","id":"CVE-2026-6195","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-13T18:00:15.007Z"}}]}}