Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67445: n/a

0
Unknown
VulnerabilityCVE-2025-67445cvecve-2025-67445
Published: Tue Feb 24 2026 (02/24/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK X5000R V9.1.0cu.2415_B20250515 contains a denial-of-service vulnerability in /cgi-bin/cstecgi.cgi. The CGI reads the CONTENT_LENGTH environment variable and allocates memory using malloc (CONTENT_LENGTH + 1) without sufficient bounds checking. When lighttpd s request size limit is not enforced, a crafted large POST request can cause memory exhaustion or a segmentation fault, leading to a crash of the management CGI and loss of availability of the web interface.

AI-Powered Analysis

AILast updated: 02/24/2026, 21:01:21 UTC

Technical Analysis

CVE-2025-67445 is a denial-of-service (DoS) vulnerability identified in the TOTOLINK X5000R router firmware version V9.1.0cu.2415_B20250515. The vulnerability resides in the /cgi-bin/cstecgi.cgi management CGI script, which processes HTTP POST requests. Specifically, the CGI reads the CONTENT_LENGTH environment variable and uses it to allocate memory via malloc(CONTENT_LENGTH + 1) without performing sufficient bounds checking or validation on the size value. If the lighttpd web server, which hosts the CGI, does not enforce a request size limit, an attacker can send an excessively large POST request. This leads to memory exhaustion or a segmentation fault in the CGI process, causing it to crash. The crash results in the loss of availability of the router’s web management interface, effectively denying legitimate users access to device management functions. The vulnerability does not require authentication or user interaction beyond sending a crafted HTTP POST request to the affected endpoint. No patches or updates are currently linked, and no known exploits have been reported in the wild as of the publication date. The root cause is improper input validation and lack of resource management in the CGI script combined with insufficient server-side request size enforcement.

Potential Impact

The primary impact of CVE-2025-67445 is a denial-of-service condition that disrupts access to the TOTOLINK X5000R router’s web management interface. This can prevent administrators from managing or configuring the device remotely, potentially delaying incident response or routine maintenance. In environments where these routers are deployed as critical network infrastructure, such as enterprise networks, small to medium businesses, or service provider edge devices, this loss of availability could lead to broader network outages or degraded service quality. Attackers could exploit this vulnerability to cause repeated crashes, leading to persistent denial of management access. Although the vulnerability does not directly compromise confidentiality or integrity, the inability to manage the device could indirectly increase risk exposure by preventing timely security updates or configuration changes. The ease of exploitation—requiring only an HTTP POST request—and lack of authentication requirements increase the threat level. However, the impact is limited to devices running the specific vulnerable firmware version and having misconfigured or unenforced request size limits on the lighttpd server.

Mitigation Recommendations

To mitigate CVE-2025-67445, organizations should first verify if their TOTOLINK X5000R routers are running the vulnerable firmware version V9.1.0cu.2415_B20250515. If so, they should monitor for firmware updates or patches from TOTOLINK and apply them promptly once available. In the interim, administrators should enforce strict request size limits on the lighttpd web server hosting the management CGI to prevent oversized POST requests from being processed. This can be done by configuring the server’s request size parameters to a safe maximum that aligns with expected legitimate traffic. Additionally, restricting access to the router’s management interface to trusted IP addresses or via VPN can reduce exposure to external attackers. Network-level protections such as web application firewalls (WAFs) or intrusion prevention systems (IPS) can be configured to detect and block abnormally large POST requests targeting the /cgi-bin/cstecgi.cgi endpoint. Regular monitoring of router logs for unusual request patterns and implementing rate limiting can further reduce risk. Finally, organizations should consider segmenting management interfaces away from public networks to limit attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699e0f3fbe58cf853b290d97

Added to database: 2/24/2026, 8:51:11 PM

Last enriched: 2/24/2026, 9:01:21 PM

Last updated: 2/24/2026, 10:23:42 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats