{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T06:55:48.499","vulnerabilities":[{"cve":{"id":"CVE-2025-70327","sourceIdentifier":"cve@mitre.org","published":"2026-02-23T21:19:09.270","lastModified":"2026-02-26T03:06:04.013","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"TOTOLINK X5000R v9.1.0cu_2415_B20250515 contains an argument injection vulnerability in the setDiagnosisCfg handler of the /usr/sbin/lighttpd executable. The ip parameter is retrieved via websGetVar and passed to a ping command through CsteSystem without validating if the input starts with a hyphen (-). This allows remote authenticated attackers to inject arbitrary command-line options into the ping utility, potentially leading to a Denial of Service (DoS) by causing excessive resource consumption or prolonged execution."},{"lang":"es","value":"TOTOLINK X5000R v9.1.0cu_2415_B20250515 contiene una vulnerabilidad de inyección de argumentos en el gestor setDiagnosisCfg del ejecutable /usr/sbin/lighttpd. El parámetro ip se recupera a través de websGetVar y se pasa a un comando ping a través de CsteSystem sin validar si la entrada comienza con un guion (-). Esto permite a atacantes remotos autenticados inyectar opciones arbitrarias de línea de comandos en la utilidad ping, lo que podría llevar a una Denegación de Servicio (DoS) al causar un consumo excesivo de recursos o una ejecución prolongada."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-88"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2415_b20250515:*:*:*:*:*:*:*","matchCriteriaId":"9B57DC2C-693C-459F-B7FD-900DF4A38A84"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*","matchCriteriaId":"BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"}]}]}],"references":[{"url":"https://github.com/neighborhood-H/0-DAY/blob/main/Toto-link/X5000R/SetDiagnosisCfg/report.md","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.notion.so/TOTOLINK-X5000R-SetDiagnosisCfg-2d170566ca7f8098a0bcee9f2a15d40d?source=copy_link","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]}]}}]}