Impact
The vulnerability resides in the cstecgi.cgi CGI handler on Totolink A8000RU routers. By sending a crafted request that manipulates the wizard argument, an attacker can execute arbitrary OS commands on the router. This command injection flaw allows the execution of system commands with the privileges of the CGI process, which can lead to full device compromise. The weakness is an example of CWE‑77 and CWE‑78, reflecting unsanitized command line construction.
Affected Systems
Affected is the Totolink A8000RU router running firmware version 7.1cu.643_b20200521 or any earlier build that has not been updated. No other versions or vendors are listed in the CNA data.
Risk and Exploitability
The CVSS score of 9.3 denotes critical severity. The EPSS score is not available, but the exploit has been published and is likely usable in the wild. The flaw can be exploited remotely via the HTTP interface from an external network. The impact is remote code execution with full control over the device, and the vulnerability is not currently listed in CISA’s KEV catalog.
OpenCVE Enrichment