CVE-2025-70328
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an authenticated attacker to run any shell command on the device by exploiting a flaw in how the system handles time synchronization input. Although the first part of the input is checked, the rest can be manipulated, giving attackers the ability to execute harmful commands if they have access to the system.
Technical Description
TOTOLINK X6000R v9.4.0cu.1498_B20250826 contains an OS command injection vulnerability in the NTPSyncWithHost handler of the /usr/sbin/shttpd executable. The host_time parameter is retrieved via sub_40C404 and passed to a date -s shell command through CsteSystem. While the first two tokens of the input are validated, the remainder of the string is not sanitized, allowing authenticated attackers to execute arbitrary shell commands via shell metacharacters.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 23, 2026
about 1 month ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
totolink
Product
x6000r firmware
Related Vulnerabilities
This vulnerability allows an attacker with access to the device to inject harmful commands into the system's ping utility, which can lead to the device becoming unresponsive or overloaded. The attacker can exploit this by sending specially crafted input that the device does not properly check, making it a serious risk for devices running the affected firmware.
This vulnerability allows an authenticated attacker to run any command on the device with full root access by manipulating certain settings in the firmware. The attacker needs to be logged in to the device to exploit this flaw, making it critical for users to secure their access.
This vulnerability allows an attacker to execute arbitrary code on the TOTOLINK A3002RU router, potentially taking full control of the device. It occurs when the router processes a specially crafted input related to IPv6 settings, meaning an attacker needs to have access to the router's configuration interface to exploit it.
This vulnerability allows an attacker to execute malicious code on the TOTOLINK A3002RU router by sending specially crafted input through the vpnUser or vpnPassword fields. To exploit this, the attacker needs access to the router's web interface, which typically requires being on the same network.
This vulnerability allows an attacker to execute arbitrary code on the TOTOLINK A3002RU router by sending specially crafted data through the router name parameter. It requires the attacker to have access to the router's web interface, which could be exploited if the router is exposed to the internet or if an attacker is on the same local network.