TOTOLINK X5000R v9.1.0cu_2415_B20250515 contains an argument injection vulnerability in the setDiagnosisCfg handler of the /usr/sbin/lighttpd executable. The ip parameter is retrieved via websGetVar and passed to a ping command through CsteSystem without validating if the input starts with a hyphen (-). This allows remote authenticated attackers to inject arbitrary command-line options into the ping utility, potentially leading to a Denial of Service (DoS) by causing excessive resource consumption or prolonged execution.
References
| Link | Resource |
|---|---|
| https://github.com/neighborhood-H/0-DAY/blob/main/Toto-link/X5000R/SetDiagnosisCfg/report.md | Exploit Third Party Advisory |
| https://www.notion.so/TOTOLINK-X5000R-SetDiagnosisCfg-2d170566ca7f8098a0bcee9f2a15d40d?source=copy_link | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
26 Feb 2026, 03:06
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2415_b20250515:*:*:*:*:*:*:* |
|
| First Time |
Totolink x5000r
Totolink x5000r Firmware Totolink |
|
| CWE | CWE-88 | |
| References | () https://github.com/neighborhood-H/0-DAY/blob/main/Toto-link/X5000R/SetDiagnosisCfg/report.md - Exploit, Third Party Advisory | |
| References | () https://www.notion.so/TOTOLINK-X5000R-SetDiagnosisCfg-2d170566ca7f8098a0bcee9f2a15d40d?source=copy_link - Exploit, Third Party Advisory |
25 Feb 2026, 15:20
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-400 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| Summary |
|
23 Feb 2026, 21:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-23 21:19
Updated : 2026-02-26 03:06
NVD link : CVE-2025-70327
Mitre link : CVE-2025-70327
CVE.ORG link : CVE-2025-70327
JSON object : View
Products Affected
totolink
- x5000r_firmware
- x5000r
