Impact
The vulnerable function setAccessDeviceCfg in the CGI handler cstecgi.cgi accepts a mac argument that is directly used in an operating‑system command context. Manipulating this parameter allows an attacker to inject arbitrary shell commands, resulting in full remote code execution. This flaw is classified as a high‑severity vulnerability and maps to command injection weaknesses.
Affected Systems
The vulnerability affects the Totolink A7100RU router running firmware 7.4cu.2313_b20191024. Any device running this firmware with the cstecgi.cgi endpoint exposed to the internet is susceptible.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.3, indicating critical severity. The attack vector is remote and an exploit has already been published, increasing the likelihood of real‑world exploitation. The EPSS score is not available, and the issue is not listed in the Known Exploited Vulnerabilities catalog, but the public availability of a working exploit warrants urgent attention.
OpenCVE Enrichment