Impact
The vulnerability resides in the setFirewallType routine of the /cgi-bin/cstecgi.cgi script on Totolink A7100RU routers. Manipulating the firewallType parameter allows an attacker to inject arbitrary shell commands, leading to remote command execution on the device. This corresponds to the CWE-77 and CWE-78 weaknesses and enables an attacker to execute any commands with the privileges of the router’s operating system, potentially compromising network traffic, device configuration, and data confidentiality.
Affected Systems
Affected hardware is the Totolink A7100RU router running firmware 7.4cu.2313_b20191024. The vulnerability is documented for this specific firmware revision; no other versions are explicitly listed, but earlier or similar firmware may also be impacted unless patched.
Risk and Exploitability
The CVSS v3.1 score of 6.9 indicates a medium severity vulnerability. No EPSS score is available, and it is not listed in the CISA KEV catalog, but the attack can be carried out remotely as stated in the CVE description. Exploitation requires only sending a crafted request to the cstecgi.cgi endpoint; no advanced prerequisites are mentioned. Consequently, the risk is substantial for devices exposed to untrusted networks.
OpenCVE Enrichment