Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink a8000ru
|
|
| Vendors & Products |
Totolink a8000ru
|
Tue, 28 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. Impacted is the function setOpenVpnClientCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument enabled can lead to os command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. | |
| Title | Totolink A8000RU CGI cstecgi.cgi setOpenVpnClientCfg os command injection | |
| First Time appeared |
Totolink
Totolink a8000ru Firmware |
|
| Weaknesses | CWE-77 CWE-78 |
|
| CPEs | cpe:2.3:o:totolink:a8000ru_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink a8000ru Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-28T12:32:05.027Z
Reserved: 2026-04-27T17:22:49.171Z
Link: CVE-2026-7242
Updated: 2026-04-28T12:31:57.446Z
Status : Deferred
Published: 2026-04-28T09:16:17.627
Modified: 2026-04-28T20:24:20.377
Link: CVE-2026-7242
No data.
OpenCVE Enrichment
Updated: 2026-04-28T19:30:27Z