Impact
The function setWiFiGuestCfg in /cgi-bin/cstecgi.cgi on Totolink LR350 routers is vulnerable to a buffer overflow caused by an unchecked ssid parameter. A remotely crafted request can overflow an internal buffer, enabling an attacker to inject and execute arbitrary code on the device, which compromises confidentiality, integrity, and availability.
Affected Systems
The vulnerability affects Totolink LR350 routers running firmware version 9.3.5u.6369_B20220309. No other firmware revisions are documented as affected in the provided data.
Risk and Exploitability
The CVSS rating of 8.7 classifies this flaw as high severity. The EPSS score is below 1%, indicating a low current likelihood of exploitation, though the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, relying on accessibility to the router’s web interface. Because exploit code has been made public, an attacker who can reach the cgi endpoint can send a malicious ssid string to trigger the overflow.
OpenCVE Enrichment