Impact
The vulnerability exists in the UploadOpenVpnCert function of /cgi-bin/cstecgi.cgi. Manipulating the FileName parameter allows injection of arbitrary OS commands, leading to remote code execution on the router firmware and compromising confidentiality, integrity, and availability of the device and connected networks. This weakness corresponds to command injection.
Affected Systems
Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024 are affected; no other versions are listed. Devices exposing the /cgi-bin/cstecgi.cgi endpoint over the network are at risk.
Risk and Exploitability
The CVSS score of 9.3 indicates critical severity. EPSS data is not available, but the vulnerability is publicly disclosed and can be exploited remotely without authentication. The CVE is not listed in the CISA KEV catalog, yet the combination of high CVSS and exposed command injection makes it a high-priority threat. Attackers can send crafted HTTP requests from anywhere on the network to execute arbitrary commands on the device.
OpenCVE Enrichment