Impact
This vulnerability is a stack‑based buffer overflow in the setWiFiEasyGuestCfg function of the /cgi‑bin/cstecgi.cgi script. Manipulating the ssid5g argument overflows a buffer on the stack, allowing an attacker to corrupt execution flow and execute arbitrary code. The description states that remote exploitation is possible and that a public exploit exists.
Affected Systems
Affected devices are TOTOLINK A7000R routers running firmware versions up to 9.1.0u.6115. Any unit with an older firmware that has not been updated can be targeted.
Risk and Exploitability
The CVSS score is 8.7, indicating a high severity. EPSS is not provided, and the vulnerability is not currently listed in CISA’s KEV catalog. Based on the description, the likely attack vector is remote, via the router’s web interface or CGI endpoint, and does not require local access. Since a published exploit exists, the risk to exposed devices is significant.
OpenCVE Enrichment