Impact
An OS command injection vulnerability exists in the setWiFiWpsConfig function of the cstecgi.cgi CGI handler on Totolink N300RH routers. By sending a specially crafted HTTP request to the /cgi-bin/cstecgi.cgi endpoint, an attacker can inject arbitrary operating system commands, enabling remote execution of commands on the device. The vulnerability is remote and the description does not specify any authentication requirement, implying that the flaw may be exploitable without credentials.
Affected Systems
The affected devices are Totolink N300RH routers running firmware version 6.1c.1353_B20190305. No other firmware versions are explicitly identified as vulnerable in the available information.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, while the EPSS score of <1% suggests a low but non‑zero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can remotely trigger the flaw via the public‑facing /cgi-bin/cstecgi.cgi endpoint, and the lack of an authentication requirement points to a potential unauthenticated attack scenario.
OpenCVE Enrichment