Impact
The vulnerability resides in the setTtyServiceCfg function of the /cgi-bin/cstecgi.cgi CGI handler on the router. By manipulating the ttyEnable argument, an attacker can inject arbitrary operating system commands, enabling execution of code outside the normal application context. This level of control allows complete compromise of the device’s confidentiality, integrity, and availability.
Affected Systems
Only Totolink A7100RU routers with firmware 7.4cu.2313_b20191024 are listed as impacted. No other vendors or product lines appear to be affected by this flaw.
Risk and Exploitability
With a CVSS score of 9.3 the issue is classified as Critical. EPSS information is not provided, but the exploit has been publicly disclosed and can be triggered remotely via the CGI endpoint. The vulnerability is not currently listed in CISA’s KEV catalog; nevertheless the combination of high severity and public exploitation make it a high‑risk threat.
OpenCVE Enrichment