Impact
A flaw in the firmware of the Totolink A8000RU router allows a remote attacker to manipulate the enable argument of the cstecgi.cgi script, resulting in arbitrary operating‑system command execution. This vulnerability is classified as OS command injection, identified by CWE‑77 and CWE‑78, and carries a CVSS score of 9.3, indicating critical severity.
Affected Systems
Any A8000RU router running firmware 7.1cu.643_b20200521 is vulnerable, as the problem resides in the setAppFilterCfg function in /cgi-bin/cstecgi.cgi accessed via the web interface.
Risk and Exploitability
Exploit code has been publicly released and can be invoked remotely without local privileges, raising the real‑world likelihood of attack. The CVSS score confirms a high risk level; while no EPSS score is available, the existence of a public exploit signals that attackers can command the device at will. Although the vulnerability has not yet been listed in the CISA KEV catalog, the combination of critical severity and available exploit warrants immediate attention.
OpenCVE Enrichment