{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7139","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-26T19:30:11.754Z","datePublished":"2026-04-27T16:15:13.119Z","dateUpdated":"2026-04-27T16:15:13.119Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-27T16:15:13.119Z"},"title":"Totolink A8000RU CGI cstecgi.cgi setWiFiAclRules os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"Totolink","product":"A8000RU","versions":[{"version":"7.1cu.643_b20200521","status":"affected"}],"cpes":["cpe:2.3:o:totolink:a8000ru_firmware:*:*:*:*:*:*:*:*"],"modules":["CGI Handler"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mode causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"CRITICAL"}},{"cvssV3_1":{"version":"3.1","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV3_0":{"version":"3.0","baseScore":9.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV2_0":{"version":"2.0","baseScore":10,"vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-26T21:35:30.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LtzHuster2 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/359738","name":"VDB-359738 | Totolink A8000RU CGI cstecgi.cgi setWiFiAclRules os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/359738/cti","name":"VDB-359738 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/801106","name":"Submit #801106 | Totolink A8000RU 7.1cu.643_b20200521 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/Litengzheng/vuldb_new2/blob/main/A8000RU/vul_314/README.md","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]}}}