Impact
A flaw in the setWiFiGuestCfg function of the /cgi-bin/cstecgi.cgi CGI handler permits an attacker to inject operating‑system commands via the wifiOff argument. This OS command injection can lead to execution of arbitrary commands on the router, effectively providing the attacker with remote code execution capabilities. The vulnerability is associated with CWE-77 and CWE-78 and a publicly available exploit exists.
Affected Systems
The vulnerability affects Totolink A7100RU routers running firmware 7.4cu.2313_b20191024. Any device of this model with the specified firmware version is vulnerable.
Risk and Exploitability
The CVSS score of 9.3 indicates critical severity, and the attack is remote, allowing exploitation over the network. An exploit is publicly posted, increasing the likelihood of real‑world attacks. The EPSS score is not available and the vulnerability is not listed in CISA's KEV catalog, but the combination of high CVSS, public exploit availability, and remote nature results in a high risk that demands prompt remediation.
OpenCVE Enrichment