The exploit also could be stopped, using a firewall rule.
Go to your router, "Administration", "Commands" and enter the follwing text:
ln -s /dev/null /tmp/exec.tmp
iptables -D INPUT -p tcp -m tcp -m webstr --url cgi-bin -j REJECT --reject-with tcp-reset
iptables -I INPUT -p tcp -m tcp -m webstr --url cgi-bin -j REJECT --reject-with tcp-reset
and press "Save Firewall", then reboot your router.
This rule blocks any try to access sth that has "cgi-bin" in the url.
You can proove, that the rule works by entering: http://192.168.1.1/cgi-bin/;reboot
in your browser. That should give a "Connection was reset" (Firefox).
Important Note: this does not work, if https managment is turned on.