Cyber Posture

CVE-2026-1548

MediumPublic PoC

Published: 28 January 2026

Published
28 January 2026
Modified
09 February 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0047 64.9th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1548 is a medium-severity Injection (CWE-74) vulnerability in Totolink A7000R Firmware. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation and sanitization of the 'url' argument in the CloudACMunualUpdateUserdata CGI function to block command injection attacks.

prevent

Mandates identification, prioritization, and remediation of the specific command injection flaw in Totolink A7000R firmware 4.1cu.4154.

preventdetect

Requires vulnerability scanning to identify and remediate instances of CVE-2026-1548 in deployed router systems.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.008 Network Device CLI Execution
Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads.
Why these techniques?

CVE enables remote exploitation of a public-facing web application (T1190) leading to command injection on a network device CLI (T1059.008).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A flaw has been found in Totolink A7000R 4.1cu.4154. This impacts the function CloudACMunualUpdateUserdata of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument url causes command injection. The attack can be initiated remotely. The exploit has been published and may…

more

be used.

Deeper analysisAI

CVE-2026-1548 is a command injection vulnerability in the Totolink A7000R router running firmware version 4.1cu.4154. The flaw affects the CloudACMunualUpdateUserdata function within the /cgi-bin/cstecgi.cgi script, where manipulation of the 'url' argument enables arbitrary command execution. Associated with CWE-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-77 (Command Injection), it carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

The vulnerability can be exploited remotely by an attacker with low privileges, such as an authenticated user, requiring no user interaction. Successful exploitation allows command injection, potentially granting limited access to confidential data, minor integrity disruptions, and low-level availability impacts on the affected device.

Advisories referenced in VulDB entries (ctiid.343232, id.343232) and related submissions document the issue, while GitHub repositories provide detailed proof-of-concept exploits for the RCE via CloudACMunualUpdateUserdata. No specific patches or mitigation steps are detailed in the available references.

Published on January 28, 2026, the exploit has been publicly released and may be actively used against vulnerable Totolink A7000R devices.

Details

CWE(s)

Affected Products

totolink
a7000r firmware
4.1cu.4154

CVEs Like This One

CVE-2026-1601Same product: Totolink A7000R
CVE-2026-1547Same product: Totolink A7000R
CVE-2026-5178Same vendor: Totolink
CVE-2025-8937Same vendor: Totolink
CVE-2026-5020Same vendor: Totolink
CVE-2026-1150Same vendor: Totolink
CVE-2026-5030Same vendor: Totolink
CVE-2026-5105Same vendor: Totolink
CVE-2026-5176Same vendor: Totolink
CVE-2026-1326Same vendor: Totolink

References