{"id":78784,"date":"2026-05-24T17:00:11","date_gmt":"2026-05-24T13:30:11","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/cve-2026-9384-totolink-a8000ru-web-management-cstecgi-cgi-setdiagnosiscfg-os-command-injection\/"},"modified":"2026-05-24T17:00:11","modified_gmt":"2026-05-24T13:30:11","slug":"cve-2026-9384-totolink-a8000ru-web-management-cstecgi-cgi-setdiagnosiscfg-os-command-injection","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2026-9384-totolink-a8000ru-web-management-cstecgi-cgi-setdiagnosiscfg-os-command-injection\/","title":{"rendered":"CVE-2026-9384 &#8211; Totolink A8000RU Web Management cstecgi.cgi setDiagnosisCfg os command injection"},"content":{"rendered":"<p>CVE ID :CVE-2026-9384<\/p>\n<p>  Published : May 24, 2026, 1:30 p.m. | 1\u00a0hour, 28\u00a0minutes ago<\/p>\n<p>  Description :A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setDiagnosisCfg of the file \/cgi-bin\/cstecgi.cgi of the component Web Management Interface. The manipulation of the argument ip results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used.<\/p>\n<p>  Severity: 0.0 | NA<\/p>\n<p>  Visit the link for more details, such as CVSS details, affected products, timeline, and more&#8230;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE ID :CVE-2026-9384 Published : May 24, 2026, 1:30 p.m. | 1\u00a0hour, 28\u00a0minutes ago Description :A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setDiagnosisCfg of the file \/cgi-bin\/cstecgi.cgi of the component Web Management Interface. The manipulation of the argument ip results in os command injection. The attack can be executed &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-78784","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=78784"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78784\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=78784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=78784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=78784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}