Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70327: n/a

0
Critical
VulnerabilityCVE-2025-70327cvecve-2025-70327
Published: Mon Feb 23 2026 (02/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK X5000R v9.1.0cu_2415_B20250515 contains an argument injection vulnerability in the setDiagnosisCfg handler of the /usr/sbin/lighttpd executable. The ip parameter is retrieved via websGetVar and passed to a ping command through CsteSystem without validating if the input starts with a hyphen (-). This allows remote authenticated attackers to inject arbitrary command-line options into the ping utility, potentially leading to a Denial of Service (DoS) by causing excessive resource consumption or prolonged execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 01:27:08 UTC

Technical Analysis

CVE-2025-70327 is an argument injection vulnerability affecting the TOTOLINK X5000R router firmware version 9.1.0cu_2415_B20250515. The vulnerability resides in the setDiagnosisCfg handler within the /usr/sbin/lighttpd executable, which processes diagnostic commands. Specifically, the ip parameter is retrieved via the websGetVar function and passed directly to the ping utility through the CsteSystem function without validating whether the input begins with a hyphen (-). This lack of input sanitization allows a remote authenticated attacker to inject arbitrary command-line options into the ping command. By crafting malicious input, the attacker can cause the ping utility to execute unintended commands or options, potentially leading to Denial of Service (DoS) conditions by consuming excessive system resources or causing prolonged execution times. The vulnerability requires authentication but no user interaction, and it can be exploited remotely over the network. The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. The underlying weakness corresponds to CWE-400 (Uncontrolled Resource Consumption). No patches or public exploits are currently available, but the vulnerability poses a significant risk to affected devices.

Potential Impact

The impact of CVE-2025-70327 is substantial for organizations deploying TOTOLINK X5000R routers with the vulnerable firmware. Successful exploitation can lead to Denial of Service conditions, disrupting network connectivity and availability of critical services dependent on these routers. The injection of arbitrary command-line options into the ping utility may also allow attackers to manipulate system behavior, potentially affecting confidentiality and integrity if combined with other vulnerabilities or misconfigurations. Since the vulnerability requires authentication, attackers who have compromised or obtained valid credentials can leverage this flaw to escalate disruption. This can affect enterprise networks, ISPs, and critical infrastructure relying on these devices, leading to operational downtime, degraded performance, and increased risk of further compromise. The widespread use of TOTOLINK devices in various regions increases the scope of potential impact, especially where these routers serve as key network gateways.

Mitigation Recommendations

To mitigate CVE-2025-70327, organizations should immediately verify if their TOTOLINK X5000R routers run the vulnerable firmware version 9.1.0cu_2415_B20250515. Since no official patches are currently available, temporary mitigations include restricting administrative access to trusted networks only and enforcing strong authentication mechanisms to prevent unauthorized access. Network segmentation can limit exposure of vulnerable devices. Administrators should monitor router logs for unusual ping command executions or resource usage spikes indicative of exploitation attempts. Input validation should be implemented in the firmware to reject ip parameters starting with hyphens or other suspicious characters. Vendors should be engaged to expedite patch development and deployment. Additionally, organizations should consider replacing vulnerable devices with updated hardware or firmware versions once available. Regular security audits and penetration testing can help identify exploitation attempts and verify mitigation effectiveness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699cbd8cbe58cf853bc4b3a0

Added to database: 2/23/2026, 8:50:20 PM

Last enriched: 3/3/2026, 1:27:08 AM

Last updated: 4/10/2026, 8:43:57 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses