Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 28 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink a8000ru
|
|
| Vendors & Products |
Totolink a8000ru
|
Tue, 28 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. | |
| Title | Totolink A8000RU CGI cstecgi.cgi setWiFiEasyGuestCfg os command injection | |
| First Time appeared |
Totolink
Totolink a8000ru Firmware |
|
| Weaknesses | CWE-77 CWE-78 |
|
| CPEs | cpe:2.3:o:totolink:a8000ru_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink a8000ru Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-28T14:05:10.753Z
Reserved: 2026-04-27T17:22:56.495Z
Link: CVE-2026-7244
Updated: 2026-04-28T14:05:07.619Z
Status : Deferred
Published: 2026-04-28T09:16:17.950
Modified: 2026-04-28T20:24:20.377
Link: CVE-2026-7244
No data.
OpenCVE Enrichment
Updated: 2026-04-28T10:30:28Z