10
CVEs
0
Critical
10
High
0
KEV
10
PoC
10
Unpatched C/H
0.0%
Patch Rate
0.8%
Avg EPSS
Severity Breakdown
CRITICAL
0
HIGH
10
MEDIUM
0
LOW
0
Monthly CVE Trend
Affected Products (30)
Command Injection
91
A3002r Firmware
46
A3002ru Firmware
23
A702r Firmware
22
Ex1200t Firmware
22
A950rg Firmware
21
Stack Overflow
21
X15 Firmware
20
A3100R Firmware
16
A810R Firmware
14
N150rt Firmware
14
A3000Ru Firmware
13
A800R Firmware
12
Memory Corruption
10
A830R Firmware
10
A7100Ru
10
Ca600 Poe Firmware
10
T10 Firmware
9
A720R Firmware
9
A3700r Firmware
8
Nr1800x Firmware
8
Ca300 Poe Firmware
8
X18 Firmware
7
Ex1800T Firmware
7
T6 Firmware
7
N600r Firmware
7
X6000r Firmware
7
X5000r Firmware
6
Cp900 Firmware
4
Lr1200Gb Firmware
4
Top Risky CVEs
| CVE | Summary | Severity | CVSS | EPSS | Priority | Signals |
|---|---|---|---|---|---|---|
| CVE-2026-5850 | OS command injection in Totolink A7100RU router firmware 7.4cu.2313_b20191024 allows unauthenticated remote attackers to execute arbitrary system commands via the pptpPassThru parameter in setVpnPassCfg function of /cgi-bin/cstecgi.cgi. Exploitation requires no user interaction and achieves full system compromise (confidentiality, integrity, availability). Publicly available exploit code exists. Attack vector is network-accessible without authentication (CVSS 8.9 Critical). | HIGH | 8.9 | 0.9% | 65 |
PoC
No patch
|
| CVE-2026-5851 | OS command injection in Totolink A7100RU router firmware 7.4cu.2313_b20191024 allows unauthenticated remote attackers to execute arbitrary system commands via the 'enable' parameter in setUPnPCfg function within /cgi-bin/cstecgi.cgi. Publicly available exploit code exists. No vendor-released patch identified at time of analysis. CVSS 8.9 (Critical) reflects network-accessible attack requiring no user interaction. | HIGH | 8.9 | 0.9% | 65 |
PoC
No patch
|
| CVE-2026-5852 | Unauthenticated remote OS command injection in Totolink A7100RU router firmware 7.4cu.2313_b20191024 enables complete system compromise via the setIptvCfg function in /cgi-bin/cstecgi.cgi. Attackers inject malicious commands through the igmpVer parameter without authentication, achieving arbitrary code execution with router privileges. CVSS 9.8 (Critical). Publicly available exploit code exists. No authentication, network-accessible attack vector with low complexity allows immediate weaponization for botnet recruitment, credential theft, or lateral network movement. | HIGH | 8.9 | 0.9% | 65 |
PoC
No patch
|
| CVE-2026-5853 | OS command injection in Totolink A7100RU router version 7.4cu.2313_b20191024 enables unauthenticated remote attackers to execute arbitrary system commands via crafted addrPrefixLen parameter in setIpv6LanCfg function of /cgi-bin/cstecgi.cgi CGI handler. CVSS 9.8 critical severity reflects network-accessible attack vector requiring no privileges or user interaction, with complete confidentiality, integrity, and availability impact. Publicly available exploit code exists. | HIGH | 8.9 | 0.9% | 65 |
PoC
No patch
|
| CVE-2026-5993 | Unauthenticated OS command injection in Totolink A7100RU router firmware 7.4cu.2313_b20191024 allows remote attackers to execute arbitrary system commands via the wifiOff parameter in the setWiFiGuestCfg function of /cgi-bin/cstecgi.cgi. CVSS 9.8 critical severity with network-accessible attack vector requiring no authentication or user interaction. Publicly available exploit code exists. Successful exploitation enables complete device compromise with high impact to confidentiality, integrity, and availability. | HIGH | 8.9 | 0.9% | 65 |
PoC
No patch
|
| CVE-2026-5994 | Remote OS command injection in Totolink A7100RU router firmware 7.4cu.2313_b20191024 via unauthenticated manipulation of telnet_enabled parameter in setTelnetCfg function. Critical CVSS 9.8 score reflects network-accessible attack requiring no authentication or user interaction, enabling full system compromise. Publicly available exploit code exists. Impacts router confidentiality, integrity, and availability with potential for complete device takeover and lateral network movement. | HIGH | 8.9 | 0.9% | 65 |
PoC
No patch
|
| CVE-2026-5995 | OS command injection in Totolink A7100RU 7.4cu.2313_b20191024 allows unauthenticated remote attackers to execute arbitrary system commands via malicious lan_info parameter to setMiniuiHomeInfoShow function in /cgi-bin/cstecgi.cgi. CVSS 9.8 critical severity with network attack vector requiring no privileges or user interaction. Publicly available exploit code exists. Complete compromise of confidentiality, integrity, and availability achievable through CGI handler manipulation. | HIGH | 8.9 | 0.9% | 65 |
PoC
No patch
|
| CVE-2026-5996 | OS command injection in Totolink A7100RU firmware 7.4cu.2313_b20191024 allows unauthenticated remote attackers to execute arbitrary system commands via the tty_server parameter in the setAdvancedInfoShow function of /cgi-bin/cstecgi.cgi. CVSS 9.8 critical severity reflects network-accessible exploitation requiring no authentication or user interaction. Publicly available exploit code exists. Attackers can achieve full system compromise including data exfiltration, configuration tampering, and denial of service against affected routers. | HIGH | 8.9 | 0.9% | 65 |
PoC
No patch
|
| CVE-2026-5997 | OS command injection in Totolink A7100RU router firmware 7.4cu.2313_b20191024 allows unauthenticated remote attackers to execute arbitrary system commands via the admpass parameter in setLoginPasswordCfg function of /cgi-bin/cstecgi.cgi. Network-accessible with no user interaction required. Publicly available exploit code exists. CVSS 9.8 critical severity reflects complete system compromise potential. | HIGH | 8.9 | 0.9% | 65 |
PoC
No patch
|
| CVE-2026-5854 | OS command injection in Totolink A7100RU router 7.4cu.2313_b20191024 allows unauthenticated remote attackers to execute arbitrary system commands via the 'merge' parameter in setWiFiEasyCfg function within /cgi-bin/cstecgi.cgi. CVSS 9.8 critical severity. Publicly available exploit code exists. Attack requires no authentication or user interaction, enabling complete system compromise including data exfiltration, configuration tampering, and denial of service. | HIGH | 8.9 | 0.2% | 65 |
PoC
No patch
|