Impact
The vulnerability allows attackers to inject arbitrary operating‑system commands by manipulating the hostTime parameter in the NTPSyncWithHost function of /cgi-bin/cstecgi.cgi. Exploitation occurs remotely through an HTTP request, giving a malicious actor the ability to execute commands on the device and potentially take full control of the router. This command injection raises the confidentiality, integrity, and availability of the affected system to a high level.
Affected Systems
The flaw exists in Totolink WA300 routers running firmware version 5.2cu.7112_B20190227. Only devices manufactured with this exact firmware revision are impacted; newer revisions that have applied a patch are not affected.
Risk and Exploitability
With a CVSS score of 5.3 the vulnerability is assessed as moderate severity, but its remote exploitation potential makes it a non‑trivial threat. The EPSS score is 3%, and the flaw is not listed in the CISA KEV catalog, yet publicly disclosed exploits exist, indicating that attackers could weaponise it. Remote attackers can craft a malicious request to /cgi-bin/cstecgi.cgi, providing a hostTime value that results in arbitrary command execution on the router’s operating system.
OpenCVE Enrichment