Impact
The vulnerability arises from the setLanCfg function in /cgi-bin/cstecgi.cgi, where an attacker can inject arbitrary commands through the lanIp parameter. This results in remote code execution on the router, allowing full control of the device. The weakness corresponds to command injection (CWE‑77) and parameter injection (CWE‑74).
Affected Systems
Totolink A3300R routers running firmware version 17.0.0cu.557_b20221024 are affected. The issue resides in the Parameter Handler component exposed via the web interface.
Risk and Exploitability
The CVSS base score of 5.3 indicates moderate severity, but remote exploitation is possible from any network location. An attacker can trigger the injection via a crafted HTTP request to the setLanCfg endpoint, and publicly available exploits exist, increasing the risk. Since EPSS is not available and the vulnerability is not listed in KEV, its exploit probability cannot be quantified, yet the presence of an online exploit suggests a real threat to exposed devices.
OpenCVE Enrichment