Impact
A firmware flaw in the Totolink A7100RU router allows an attacker to manipulate the merge argument of the setWiFiEasyCfg function within the /cgi-bin/cstecgi.cgi CGI handler. This manipulation results in operating‑system command injection, enabling an adversary to run arbitrary commands with the privileges of the router software.
Affected Systems
The vulnerability affects all Totolink A7100RU devices that are running firmware version 7.4cu.2313_b20191024. Devices with other firmware releases are not known to be impacted.
Risk and Exploitability
The CVSS score of 9.3 indicates a very high severity. An EPSS score is not available, and the flaw is not listed in the CISA KEV catalog. The attack vector is remote, relying on network access to the router’s web interface. Because the exploit is publicly available, an attacker can potentially achieve full control of the router if the vulnerability is not mitigated.
OpenCVE Enrichment