Impact
The setNetworkCfg function in /cgi-bin/cstecgi.cgi of the A7100RU firmware accepts a proto parameter that can be manipulated to trigger an OS command injection. This flaw allows remote attackers to execute arbitrary system commands on the router, giving them full control of the device’s operating system. The vulnerability directly compromises the confidentiality, integrity and availability of the router itself.
Affected Systems
The vulnerability affects the Totolink A7100RU router with firmware version 7.4cu.2313_b20191024; no other versions or products are listed as affected.
Risk and Exploitability
The CVSS score of 9.3 marks this as a critical issue. The attack vector is remote, as a crafted HTTP request to cstecgi.cgi can trigger the flaw. The public availability of exploit code suggests a higher likelihood of exploitation, though the exact probability is not quantified in the data provided. The device is commonly exposed to the internet, making it a prime target for attackers seeking to compromise consumer routers. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment