Vulnerability Description
TOTOLINK X5000R v9.1.0cu_2415_B20250515 contains an argument injection vulnerability in the setDiagnosisCfg handler of the /usr/sbin/lighttpd executable. The ip parameter is retrieved via websGetVar and passed to a ping command through CsteSystem without validating if the input starts with a hyphen (-). This allows remote authenticated attackers to inject arbitrary command-line options into the ping utility, potentially leading to a Denial of Service (DoS) by causing excessive resource consumption or prolonged execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | X5000R Firmware | 9.1.0cu.2415_b20250515 |
| Totolink | X5000R | - |
Related Weaknesses (CWE)
References
- https://github.com/neighborhood-H/0-DAY/blob/main/Toto-link/X5000R/SetDiagnosisCExploitThird Party Advisory
- https://www.notion.so/TOTOLINK-X5000R-SetDiagnosisCfg-2d170566ca7f8098a0bcee9f2aExploitThird Party Advisory
FAQ
What is CVE-2025-70327?
CVE-2025-70327 is a vulnerability with a CVSS score of 9.8 (CRITICAL). TOTOLINK X5000R v9.1.0cu_2415_B20250515 contains an argument injection vulnerability in the setDiagnosisCfg handler of the /usr/sbin/lighttpd executable. The ip parameter is retrieved via websGetVar a...
How severe is CVE-2025-70327?
CVE-2025-70327 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-70327?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink X5000R Firmware, Totolink X5000R.