Impact
The Totolink WA300 router exposes a command injection flaw in its /cgi-bin/cstecgi.cgi endpoint. By sending a crafted POST request to the setLanguageCfg action, an attacker can manipulate the langType argument to inject arbitrary shell commands. This is a classic command injection vulnerability (CWE‑77) enabled by inadequate input validation (CWE‑74), giving an attacker the ability to execute any command on the device and fully compromise the router’s management plane.
Affected Systems
It affects Totolink WA300 routers running firmware build 5.2cu.7112_B20190227. Devices with this exact firmware version are known to be vulnerable; other firmware builds have not been reported as affected.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, and the EPSS score is 3% while the vulnerability is not listed in CISA KEV. A public exploit has been released, meaning an attacker can reach the vulnerable endpoint remotely via an HTTP POST request and compromise any router that accepts such traffic over the network.
OpenCVE Enrichment