Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70329: n/a

0
High
VulnerabilityCVE-2025-70329cvecve-2025-70329
Published: Mon Feb 23 2026 (02/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-70329 is a high-severity OS command injection vulnerability in TOTOLink X5000R routers running firmware v9. 1. 0cu_2415_B20250515. The flaw exists in the setIptvCfg handler of the /usr/sbin/lighttpd executable, where vlanVidLanX parameters are insufficiently validated before being passed to a system command function. An authenticated attacker can exploit this by injecting shell metacharacters, leading to arbitrary command execution with root privileges. This vulnerability requires authentication but no user interaction and affects confidentiality, integrity, and availability. No public exploits are known yet, and no patches have been released. Organizations using this router model should prioritize mitigation to prevent potential compromise.

AI-Powered Analysis

AILast updated: 02/23/2026, 20:52:54 UTC

Technical Analysis

CVE-2025-70329 is an OS command injection vulnerability identified in the TOTOLink X5000R router firmware version 9.1.0cu_2415_B20250515. The vulnerability resides in the setIptvCfg handler within the /usr/sbin/lighttpd executable, which processes IPTV configuration parameters. Specifically, the vlanVidLan1 and other vlanVidLanX parameters are retrieved using the Uci_Get_Str function and then passed directly to the CsteSystem function without proper input validation or sanitization. This lack of filtering allows an authenticated attacker to inject shell metacharacters into these parameters, resulting in arbitrary command execution with root privileges on the device. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 base score is 8.0, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the potential for full system compromise is significant. The vulnerability was published on February 23, 2026, and no official patches or mitigations have been released by the vendor at this time.

Potential Impact

Exploitation of this vulnerability allows an authenticated attacker to execute arbitrary commands with root privileges on affected TOTOLink X5000R routers. This can lead to complete compromise of the device, including unauthorized access to network traffic, manipulation or disruption of network services, installation of persistent malware, and lateral movement within the network. The impact extends to confidentiality, as sensitive data passing through the router can be intercepted or altered; integrity, as configurations and firmware can be modified maliciously; and availability, as attackers can disrupt or disable network connectivity. Organizations relying on these routers for critical network infrastructure or IPTV services face significant operational and security risks. The requirement for authentication limits exposure but does not eliminate risk, especially in environments where credentials may be weak, reused, or compromised. The absence of patches increases the window of vulnerability, potentially inviting targeted attacks once exploit code becomes available.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interfaces to trusted and secure networks only, preferably via VPN or isolated management VLANs. 2. Enforce strong, unique passwords for all authenticated access to the device to reduce risk of credential compromise. 3. Monitor router logs and network traffic for unusual commands or behavior indicative of exploitation attempts. 4. Disable or limit IPTV configuration features if not required to reduce the attack surface. 5. Implement network segmentation to isolate vulnerable devices from critical infrastructure. 6. Regularly check for vendor updates or security advisories and apply firmware patches promptly once available. 7. Consider deploying host-based intrusion detection systems (HIDS) or network intrusion detection systems (NIDS) to detect anomalous activity related to command injection. 8. Conduct periodic security audits and penetration testing focusing on router configurations and access controls. 9. If possible, replace affected devices with models not susceptible to this vulnerability or with confirmed patched firmware versions. 10. Educate network administrators about the risks of command injection and the importance of input validation and secure configuration.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699cbd8cbe58cf853bc4b404

Added to database: 2/23/2026, 8:50:20 PM

Last enriched: 2/23/2026, 8:52:54 PM

Last updated: 2/24/2026, 5:18:56 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats