Impact
The vulnerability is an OS command injection in the setScheduleCfg function of /cgi-bin/cstecgi.cgi on the Totolink A7100RU router. An attacker can craft the mode argument to cause the router to execute arbitrary shell commands, giving full control of the device. This allows compromise of confidentiality, integrity, and availability of the device and any connected network. The weakness aligns with CWE‑77 and CWE‑78.
Affected Systems
The flaw affects Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. The vendor and product details are confirmed in the CVE references. No other products or versions are listed.
Risk and Exploitability
The CVSS score of 6.9 denotes medium severity, and the exploit is publicly available, indicating a realistic risk of exploitation. EPSS information is not provided, but the public availability of the exploit suggests attackers could leverage it. The vulnerability is not flagged in the CISA KEV catalog. The attack can be executed remotely by sending a manipulated mode parameter to the vulnerable CGI endpoint.
OpenCVE Enrichment