{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7138","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-26T19:30:08.560Z","datePublished":"2026-04-27T16:00:16.713Z","dateUpdated":"2026-04-27T16:23:28.294Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-27T16:00:16.713Z"},"title":"Totolink A8000RU CGI cstecgi.cgi setNtpCfg os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"Totolink","product":"A8000RU","versions":[{"version":"7.1cu.643_b20200521","status":"affected"}],"cpes":["cpe:2.3:o:totolink:a8000ru_firmware:*:*:*:*:*:*:*:*"],"modules":["CGI Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setNtpCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument tz results in os command injection. The attack can be executed remotely. The exploit is now public and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"CRITICAL"}},{"cvssV3_1":{"version":"3.1","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV3_0":{"version":"3.0","baseScore":9.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV2_0":{"version":"2.0","baseScore":10,"vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-26T21:35:27.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LtzHuster2 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/359737","name":"VDB-359737 | Totolink A8000RU CGI cstecgi.cgi setNtpCfg os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/359737/cti","name":"VDB-359737 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/801105","name":"Submit #801105 | Totolink A8000RU 7.1cu.643_b20200521 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/Litengzheng/vuldb_new2/blob/main/A8000RU/vul_313/README.md","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-27T16:21:00.742400Z","id":"CVE-2026-7138","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-27T16:23:28.294Z"}}]}}