Please note the bug only happens with /bin/bash ... if your CGI script does the widely-recommended thing and uses the more standard /bin/sh, it's not vulnerable. Check your scripts: this is a serious flaw. Personal and game servers are a most likely target for exploits.
The exploit can be performed through mechanisms other than web server CGI scripts. For example, progarms that use the system() call (which includes Apache's mod_cgi, even if you're running Perl, Python or PhP scripts). Most widely used Linux distributions (at least Debian-derived ones) do not use /bin/bash as the default shell so again your system should not be vulnerable. I can not speak for Mac OS, but most Unixes I've used used the POSIX shell not the GNU Bourne Again Shell by default. If in doubt, check your system default shell.
Also, note that the major Linux distros have already made a patch (or 2 patches) available. You should always keep your system up-to-date with security patches.
Most routers and other embedded systems you might have are unlikely to run /bin/bash (it's a memory pig) and instead use BusyBox, so they're unlikely to be affected.