CVE-2025-70329 - Vulnerability Analysis
HighCVSS: 8.0Last Updated: February 24, 2026
TOTOLink X5000R - Command Injection
Overview
TOTOLink X5000R v9.1.0cu_2415_B20250515 contains an OS command injection caused by inadequate validation of vlanVidLanX parameters in setIptvCfg handler of /usr/sbin/lighttpd, letting authenticated attackers execute arbitrary shell commands with root privileges.
Severity & Score
Impact
Authenticated attackers can execute arbitrary commands as root, leading to full system compromise.
Mitigation
Update to the latest version with proper input validation or apply vendor patches.
References
Social Media Activity(1 post)
š CVE-2025-70329 - High (8) TOTOLink X5000R v9.1.0cu_2415_B20250515 contains an OS command injection vulnerability in the setIptvCfg handler of the /usr/sbin/lighttpd executable. The vlanVidLan1 (and other vlanVidLanX) parameters are retrieved via Uci_Get_Str and passed to t... š https://www.thehackerwire.com/vulnerability/CVE-2025-70329/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2025-70329
- Severity
- High
- CVSS Score
- 8.0
- Type
- command_injection
- Status
- confirmed
- EPSS
- 42.9%
- Social Posts
- 1
CWE
- CWE-78
CVSS Metrics
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H