Impact
The flaw lies in the setWiFiEasyGuestCfg routine of /cgi-bin/cstecgi.cgi, where user-supplied ssid data is copied into a fixed‑size buffer without proper bounds checking. This stack‑based overflow can be triggered by a specially crafted ssid value sent from a remote host, and the publicly available exploit demonstrates that an attacker can potentially execute arbitrary code or crash the device, leading to loss of confidentiality, integrity or availability.
Affected Systems
The vulnerability affects Totolink LR350 routers operating with firmware 9.3.5u.6369_B20220309. No other vendors or product variants are listed in the available data.
Risk and Exploitability
With a CVSS score of 8.7 the flaw is high severity, and the EPSS score of less than 1% suggests that exploitation is not yet widespread. The vulnerability is not currently catalogued in the CISA KEV list, but the public exploit code indicates that a remote attacker can target the /cgi-bin/cstecgi.cgi endpoint to trigger the overflow and potentially gain remote code execution on the device.
OpenCVE Enrichment