Impact
A flaw in the setUPnPCfg function within /cgi-bin/cstecgi.cgi allows an attacker to inject shell commands through the enable parameter. This permits execution of arbitrary commands on the device, potentially compromising confidentiality, integrity, and availability. The weakness is related to improper handling of user input and command construction, identified as CWE‑74 and CWE‑77.
Affected Systems
The vulnerability affects the Totolink A3300R router running firmware version 17.0.0cu.557_b20221024. Users of this specific firmware are at risk.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, and the public availability of an exploit increases the likelihood of exploitation. While no EPSS score is available and it is not listed in the KEV catalog, the attack vector is remote and does not require local access. An attacker with network reach to the device can send a crafted request to trigger command execution.
OpenCVE Enrichment