Impact
A security flaw in the Totolink A7100RU router allows an attacker to inject operating system commands through the setWiFiAclRules parameter in the /cgi-bin/cstecgi.cgi interface. The vulnerability is a classic OS command injection (CWE‑77 and CWE‑78) and can be leveraged remotely, giving full control over the device’s operating system and compromising confidentiality, integrity, and availability.
Affected Systems
Devices affected are Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. The flaw resides in the CGI Handler component within the router’s system firmware.
Risk and Exploitability
The flaw carries a CVSS score of 9.3, indicating a critical impact. Although no EPSS score is available, the vulnerability has been publicly disclosed and exploited, and it is not listed in the CISA KEV catalog yet. Attackers can exploit the flaw remotely by sending a crafted mode parameter to the cstecgi.cgi endpoint, leading to arbitrary command execution on the router.
OpenCVE Enrichment