Impact
The A7100RU firmware contains a flaw in the setDdnsCfg function of /cgi-bin/cstecgi.cgi. An attacker can supply crafted URL parameters that are passed to the underlying shell without proper sanitization, allowing them to execute arbitrary OS commands on the device. This vulnerability is a classic example of OS command injection (CWE‑77, CWE‑78) and can lead to remote code execution, compromising confidentiality, integrity, and availability of the device’s network traffic.
Affected Systems
Only the Totolink A7100RU routers running firmware 7.4cu.2313_b20191024 are affected. The flaw resides in the cstecgi.cgi script bundled with that firmware release. No other Totolink products or firmware versions are reported to be impacted by this defect.
Risk and Exploitability
With a CVSS base score of 6.9, the risk is moderate but the flaw allows full remote code execution. The EPSS score is not available, but the vulnerability has been publicly disclosed and demonstrated, indicating that exploitation is feasible without special conditions. Because the attack vector is remote, any user connecting to the web interface from an untrusted network is potentially exposed; the vendor has not listed it in the KEV catalog, but the public availability of exploit code raises concern.
OpenCVE Enrichment