Impact
The vulnerability resides in the setRemoteCfg function of /cgi-bin/cstecgi.cgi on Totolink A7100RU routers running firmware 7.4cu.2313_b20191024. Manipulating the enable argument allows an attacker to inject arbitrary OS commands, representing classic command injection weaknesses (CWE-77 and CWE-78). The flaw enables remote execution of system commands with the privileges of the router, potentially compromising the device and the network it manages.
Affected Systems
Devices affected are Totolink A7100RU routers supplied with firmware 7.4cu.2313_b20191024. No other vendors or products are listed in the CNA data.
Risk and Exploitability
The CVSS base score of 6.9 indicates moderate severity, and the EPSS score of <1% indicates a very low probability of exploitation. The vulnerability is not yet catalogued in CISA’s KEV list, but an exploit has been published. The flaw can be triggered remotely, presumably via HTTP requests to the setRemoteCfg endpoint, which can be automated and does not require authentication.
OpenCVE Enrichment