Impact
A flaw in the setStaticRoute function of /cgi-bin/cstecgi.cgi allows an attacker to craft an input that is not properly sanitized. When the ip argument is manipulated, the router executes arbitrary shell commands supplied by the attacker. This leads to control over the router via remote command execution, potentially allowing full compromise of the device's firmware.
Affected Systems
Totolink A3300R routers running firmware version 17.0.0cu.557_b20221024 are vulnerable. The issue resides in the web management interface of the cstecgi.cgi script.
Risk and Exploitability
The CVSS score of 5.3 indicates medium severity, and the EPSS score is unavailable. The vulnerability is not listed in the CISA KEV catalog, yet the exploit has been publicly disclosed and can be triggered remotely by sending a crafted HTTP request to the cstecgi.cgi endpoint. Only network availability of the device is required for exploitation. Given the moderate score and public availability, the risk is considered significant for exposed devices.
OpenCVE Enrichment