Impact
The setAPNetwork function in the file /cgi-bin/cstecgi.cgi on the Totolink WA300 router accepts an Ipaddr argument that is not properly sanitized, allowing remote attackers to inject arbitrary OS commands. This vulnerability results in an attacker being able to execute commands with the privileges of the router, potentially compromising its confidentiality, integrity, and availability.
Affected Systems
Totolink WA300 routers running firmware version 5.2cu.7112_B20190227 are affected. No other firmware versions are listed as impacted.
Risk and Exploitability
The CVSS base score of 5.3 indicates a moderate severity. The EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in CISA's KEV catalog. Attackers can exploit this weakness remotely by sending crafted requests to the setAPNetwork endpoint without needing authentication, as the description states that the attack may be performed from remote.
OpenCVE Enrichment