Impact
The vulnerability resides in the setDiagnosisCfg function of /cgi-bin/cstecgi.cgi in Totolink A7100RU firmware 7.4cu.2313_b20191024 and allows an attacker to inject arbitrary OS commands by manipulating the ip argument. This leads to full control over the router, enabling configuration changes, installation of backdoors, or use of the device for further malicious activities. The weakness is identified as command injection (CWE-77) and operating system command execution (CWE-78).
Affected Systems
Only Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024 are known to be vulnerable. No other firmware builds are enumerated in the data, so verification is required for all devices.
Risk and Exploitability
The CVSS base score of 9.3 denotes a critical severity. Exploitation is remote through HTTP requests to the CGI script and publicly disclosed exploit code is available, raising the likelihood of real-world attacks. The EPSS score is not provided and the vulnerability is not listed in the CISA KEV catalog, but its public availability mandates rapid response.
OpenCVE Enrichment