{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7823","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-05-04T22:14:08.282Z","datePublished":"2026-05-05T04:45:13.416Z","dateUpdated":"2026-05-05T12:36:07.632Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-05-05T04:45:13.416Z"},"title":"Totolink A8000RU cstecgi.cgi setAppFilterCfg os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"Totolink","product":"A8000RU","versions":[{"version":"7.1cu.643_b20200521","status":"affected"}],"cpes":["cpe:2.3:o:totolink:a8000ru_firmware:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function setAppFilterCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument enable results in os command injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"CRITICAL"}},{"cvssV3_1":{"version":"3.1","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV3_0":{"version":"3.0","baseScore":9.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV2_0":{"version":"2.0","baseScore":10,"vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-05-04T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-05-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-05-05T00:19:13.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LtzHust2 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/361075","name":"VDB-361075 | Totolink A8000RU cstecgi.cgi setAppFilterCfg os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/361075/cti","name":"VDB-361075 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/807775","name":"Submit #807775 | Totolink A8000RU 7.1cu.643_b20200521 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/Litengzheng/vuldb_new2/blob/main/A8000RU/vul_330/README.md","tags":["exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-05T12:35:55.992951Z","id":"CVE-2026-7823","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-05T12:36:07.632Z"}}]}}