CVE-2025-70327

CRITICAL
2026-02-23 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:55 vuln.today
PoC Detected
Feb 26, 2026 - 03:06 vuln.today
Public exploit code
CVE Published
Feb 23, 2026 - 21:19 nvd
CRITICAL 9.8

Description

TOTOLINK X5000R v9.1.0cu_2415_B20250515 contains an argument injection vulnerability in the setDiagnosisCfg handler of the /usr/sbin/lighttpd executable. The ip parameter is retrieved via websGetVar and passed to a ping command through CsteSystem without validating if the input starts with a hyphen (-). This allows remote authenticated attackers to inject arbitrary command-line options into the ping utility, potentially leading to a Denial of Service (DoS) by causing excessive resource consumption or prolonged execution.

Analysis

Argument injection in TOTOLINK X5000R router v9.1.0cu via setDiagnosisCfg handler allows unauthenticated remote code execution. EPSS 2.0% with PoC available.

Technical Context

CWE-88 argument injection in setDiagnosisCfg. Similar to CVE-2026-3301 in TOTOLINK N300RH — systematic vulnerability across the TOTOLINK product line.

Affected Products

['TOTOLINK X5000R v9.1.0cu_2415_B20250515']

Remediation

Update router firmware. Disable remote management.

Priority Score

71
Low Medium High Critical
KEV: 0
EPSS: +2.0
CVSS: +49
POC: +20

Share

CVE-2025-70327 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy