Impact
A command‑injection flaw exists in Totolink A8000RU’s CGI handler. The setUPnPCfg function, located in /cgi-bin/cstecgi.cgi, improperly sanitizes an argument, allowing an attacker to execute arbitrary operating‑system commands on the device. This weakness can be leveraged to take full control of the router’s firmware environment, compromising confidentiality, integrity, and availability.
Affected Systems
The vulnerability is confirmed on the Totolink A8000RU model, specifically firmware version 7.1cu.643_b20200521. Other firmware releases of the same model may also be affected if they contain the same code path, but no explicit list is provided beyond the referenced build.
Risk and Exploitability
With a CVSS base score of 9.3, the flaw is rated critical. The exploit is feasible from a remote network location by manipulating request parameters to the /cgi-bin/cstecgi.cgi endpoint, without needing local access. The EPSS score is not available, and the flaw is not currently listed in CISA’s KeV catalog, but the high severity and remote nature make it a priority threat.
OpenCVE Enrichment