Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67445: n/a

0
Medium
VulnerabilityCVE-2025-67445cvecve-2025-67445
Published: Tue Feb 24 2026 (02/24/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK X5000R V9.1.0cu.2415_B20250515 contains a denial-of-service vulnerability in /cgi-bin/cstecgi.cgi. The CGI reads the CONTENT_LENGTH environment variable and allocates memory using malloc (CONTENT_LENGTH + 1) without sufficient bounds checking. When lighttpd s request size limit is not enforced, a crafted large POST request can cause memory exhaustion or a segmentation fault, leading to a crash of the management CGI and loss of availability of the web interface.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 18:54:00 UTC

Technical Analysis

CVE-2025-67445 is a denial-of-service (DoS) vulnerability identified in the TOTOLINK X5000R router firmware version V9.1.0cu.2415_B20250515. The issue resides in the /cgi-bin/cstecgi.cgi management CGI script, which improperly handles the CONTENT_LENGTH environment variable. Specifically, the CGI uses malloc to allocate memory based on CONTENT_LENGTH + 1 without sufficient bounds checking, leading to potential memory exhaustion or segmentation faults. This vulnerability is exploitable when the lighttpd web server, which hosts the management interface, does not enforce its request size limit. An attacker can craft a large POST request that exceeds expected limits, causing the CGI to allocate excessive memory, resulting in a crash of the management interface. This crash leads to loss of availability of the router's web management interface, effectively causing a denial-of-service condition. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption). The attack vector is adjacent network, meaning the attacker must be on the same local network or connected network segment. No authentication or user interaction is required, making exploitation straightforward if network access is available. The CVSS v3.1 base score is 6.5, reflecting medium severity due to the impact on availability without affecting confidentiality or integrity. No patches or mitigations have been officially released at the time of reporting, and no known exploits have been observed in the wild.

Potential Impact

The primary impact of CVE-2025-67445 is the loss of availability of the TOTOLINK X5000R router's web management interface. This denial-of-service condition can disrupt administrative access to the device, preventing configuration changes, monitoring, or troubleshooting via the web GUI. For organizations relying on this router model, especially in small to medium business or home office environments, this could lead to prolonged downtime or degraded network management capabilities. Although the vulnerability does not directly compromise confidentiality or integrity, the inability to manage the device could delay incident response or security updates, indirectly increasing risk. Additionally, repeated exploitation could cause device instability or require physical reboot, impacting network reliability. Since the attack requires network adjacency, the threat is more significant in environments where attackers have local network access, such as compromised internal networks or poorly segmented wireless networks. The absence of authentication requirements lowers the barrier to exploitation, increasing the risk in exposed network segments.

Mitigation Recommendations

To mitigate CVE-2025-67445, organizations should first verify if they are using the affected TOTOLINK X5000R firmware version V9.1.0cu.2415_B20250515. If so, immediate steps include restricting access to the router's management interface by implementing network segmentation and firewall rules to limit access only to trusted administrators and management stations. Enforce strict access controls on the local network to prevent unauthorized users from reaching the device's web interface. Monitor network traffic for unusually large POST requests targeting /cgi-bin/cstecgi.cgi and implement intrusion detection or prevention systems to alert or block such attempts. If possible, disable or restrict the use of the vulnerable CGI endpoint until a patch is available. Contact TOTOLINK support or monitor official channels for firmware updates addressing this vulnerability and apply patches promptly once released. Additionally, consider alternative management methods such as SSH or SNMP if supported and secure. Regularly audit device configurations and logs to detect signs of attempted exploitation. Finally, enforce the request size limits on the lighttpd web server configuration to prevent oversized POST requests from reaching the CGI script.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699e0f3fbe58cf853b290d97

Added to database: 2/24/2026, 8:51:11 PM

Last enriched: 3/4/2026, 6:54:00 PM

Last updated: 4/9/2026, 8:43:29 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses