Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70328: n/a

0
High
VulnerabilityCVE-2025-70328cvecve-2025-70328
Published: Mon Feb 23 2026 (02/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK X6000R v9.4.0cu.1498_B20250826 contains an OS command injection vulnerability in the NTPSyncWithHost handler of the /usr/sbin/shttpd executable. The host_time parameter is retrieved via sub_40C404 and passed to a date -s shell command through CsteSystem. While the first two tokens of the input are validated, the remainder of the string is not sanitized, allowing authenticated attackers to execute arbitrary shell commands via shell metacharacters.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 01:24:37 UTC

Technical Analysis

CVE-2025-70328 is an OS command injection vulnerability affecting the TOTOLINK X6000R router firmware version 9.4.0cu.1498_B20250826. The vulnerability resides in the NTPSyncWithHost handler of the /usr/sbin/shttpd executable, which processes the host_time parameter. This parameter is retrieved by the sub_40C404 function and subsequently passed to a shell command 'date -s' via the CsteSystem function. While the implementation validates the first two tokens of the input string, it fails to sanitize the remaining portion, allowing shell metacharacters to be injected. This flaw enables an authenticated attacker to execute arbitrary shell commands on the underlying operating system with the privileges of the shttpd process, potentially leading to full device compromise. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring privileges but no user interaction. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported as of the publication date. This vulnerability could be leveraged to manipulate device time settings, execute persistent malicious code, or pivot into internal networks.

Potential Impact

The impact of CVE-2025-70328 is significant for organizations deploying TOTOLINK X6000R routers with the affected firmware. Successful exploitation allows attackers to execute arbitrary commands on the device, potentially leading to full compromise of the router. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and installation of persistent malware or backdoors. The compromise of network infrastructure devices like routers can undermine the security posture of entire organizations, enabling lateral movement and data exfiltration. Given the router's role in home and small to medium business networks, the vulnerability poses risks to confidentiality, integrity, and availability of network communications. The requirement for authentication limits exposure but does not eliminate risk, especially in environments where credentials may be weak, default, or compromised. The lack of known exploits in the wild currently reduces immediate threat but the high CVSS score indicates a strong incentive for attackers to develop exploits once available.

Mitigation Recommendations

To mitigate CVE-2025-70328, organizations should first verify if their TOTOLINK X6000R devices are running the vulnerable firmware version 9.4.0cu.1498_B20250826. Since no official patches are currently available, immediate mitigation steps include restricting administrative access to the router's management interface by limiting it to trusted IP addresses and enforcing strong, unique authentication credentials to prevent unauthorized access. Network segmentation should be employed to isolate the router management interface from untrusted networks. Monitoring and logging of administrative access attempts should be enhanced to detect suspicious activities. If possible, disable or restrict the NTPSyncWithHost functionality or the shttpd service until a patch is released. Organizations should also maintain vigilance for firmware updates from TOTOLINK and apply them promptly once available. Employing network intrusion detection systems (NIDS) to detect anomalous command injection patterns targeting the router may provide early warning. Finally, consider replacing vulnerable devices with models that have a stronger security track record if timely patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699cbd8cbe58cf853bc4b3ae

Added to database: 2/23/2026, 8:50:20 PM

Last enriched: 3/3/2026, 1:24:37 AM

Last updated: 4/10/2026, 3:36:57 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses