Impact
The flaw resides in the recvUpgradeNewFw function of the cstecgi.cgi script on Totolink WA300 routers. Manipulating this endpoint allows an unauthenticated remote actor to inject arbitrary operating‑system commands, resulting in full remote code execution. The weakness is a classic OS command injection, corresponding to CWE‑77 and CWE‑78. An attacker can run any command on the underlying firmware, potentially compromising the entire device and any network services it hosts.
Affected Systems
Affected devices are Totolink WA300 routers running firmware version 5.2cu.7112_B20190227. The vulnerability is confined to the specific cgi module in this firmware build; newer firmware revisions are not known to contain the issue.
Risk and Exploitability
The CVSS score of 6.9 indicates medium severity, while an EPSS score of 4% suggests a low to moderate probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, implying no confirmed widespread exploitation yet. Attackers can target the device over the network by sending crafted CGI requests to /cgi-bin/cstecgi.cgi; no local access or privileged credentials are required.
OpenCVE Enrichment