Impact
The vulnerability permits attackers to inject arbitrary commands via the setTracerouteCfg argument of the /cgi-bin/cstecgi.cgi POST handler. This allows remote execution of shell commands on the affected router, which can lead to full compromise of the device, loss of confidentiality, integrity, and availability.
Affected Systems
Totolink NR1800X routers running firmware version 9.1.0u.6279_B20210910 are affected. The vulnerability exists in the POST Request Handler component where the cstecgi.cgi script processes traceroute configuration requests.
Risk and Exploitability
The CVSS v3.1 score of 5.3 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation at present. The vulnerability is not included in the CISA Known Exploited Vulnerabilities catalog. The attack can be launched remotely by sending a crafted POST request that manipulates the command parameter, leading to arbitrary code execution without requiring prior authentication or local access.
OpenCVE Enrichment