Totolink NR1800X Command Injection Vulnerability
A command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.
A command injection vulnerability, identified as CVE-2026-7548, affects Totolink NR1800X router version 9.1.0u.6279_B20210910. The vulnerability resides within the sub_41A68C function of the /cgi-bin/cstecgi.cgi file. By manipulating the setUssd argument, a remote attacker can inject arbitrary commands into the system. Publicly available exploit code makes exploitation easier. This vulnerability poses a significant risk as it allows unauthenticated remote attackers to execute arbitrary commands on the affected device, potentially leading to full system compromise.
Attack Chain
- The attacker identifies a vulnerable Totolink NR1800X device running firmware version 9.1.0u.6279_B20210910.
- The attacker sends a crafted HTTP request to the
/cgi-bin/cstecgi.cgiendpoint. - The HTTP request includes the
setUssdargument with a malicious payload designed to inject a command. - The
sub_41A68Cfunction processes thesetUssdargument without proper sanitization. - The injected command is executed by the system with the privileges of the web server process.
- The attacker gains initial access and can execute arbitrary commands on the device.
- The attacker may then use the command execution to escalate privileges, install malware, or pivot to other devices on the network.
Impact
Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the affected Totolink NR1800X router. This could lead to complete compromise of the device, allowing the attacker to control network traffic, modify router settings, or use the router as a pivot point to attack other devices on the network. Given the wide usage of Totolink routers, a large number of devices could be vulnerable.
Recommendation
- Monitor web server logs for requests to
/cgi-bin/cstecgi.cgicontaining suspicious characters or command injection attempts in thesetUssdparameter, using the Sigma rule provided below. - Implement rate limiting on the
/cgi-bin/cstecgi.cgiendpoint to mitigate brute-force exploitation attempts. - Apply available patches provided by Totolink to address the CVE-2026-7548 vulnerability.
- Deploy the Sigma rule to your SIEM and tune for your environment.
Detection coverage 2
Detect Totolink NR1800X Command Injection Attempt
criticalDetects command injection attempts in the setUssd parameter of the /cgi-bin/cstecgi.cgi endpoint.
Detect suspicious characters in URI query
highDetects the presence of suspicious characters indicative of command injection attempts within URI queries.
Detection queries are kept inside the platform. Get full rules →