Cyber Posture

CVE-2025-70328

HighPublic PoC

Published: 23 February 2026

Published
23 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0315 87.0th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

TOTOLINK X6000R v9.4.0cu.1498_B20250826 contains an OS command injection vulnerability in the NTPSyncWithHost handler of the /usr/sbin/shttpd executable. The host_time parameter is retrieved via sub_40C404 and passed to a date -s shell command through CsteSystem. While the first two tokens of…

more

the input are validated, the remainder of the string is not sanitized, allowing authenticated attackers to execute arbitrary shell commands via shell metacharacters.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of information inputs like the host_time parameter to prevent OS command injection via unsanitized shell metacharacters.

prevent

SI-2 mandates identification, reporting, and correction of system flaws such as this OS command injection vulnerability through timely patching.

prevent

SI-9 enforces restrictions on information inputs like host_time to block injection of shell metacharacters beyond validated tokens.

Security SummaryAI

CVE-2025-70328 is an OS command injection vulnerability affecting the TOTOLINK X6000R router running firmware version v9.4.0cu.1498_B20250826. The issue resides in the NTPSyncWithHost handler within the /usr/sbin/shttpd executable, where the host_time parameter is retrieved via sub_40C404 and passed unsanitized to a date -s shell command through CsteSystem. Although the first two tokens of the input are validated, the remainder of the string lacks sanitization, enabling the injection of shell metacharacters to execute arbitrary commands. The vulnerability is associated with CWE-78 (OS Command Injection) and CWE-94 (Improper Control of Generation of Code), and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). It was published on 2026-02-23.

Authenticated attackers with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting a malicious host_time parameter, they can inject shell metacharacters beyond the validated tokens, leading to arbitrary shell command execution on the device. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing full compromise of the router.

Advisories detailing the vulnerability, including potential mitigation guidance, are available in the following references: https://github.com/neighborhood-H/0-DAY/blob/main/Toto-link/X6000R/NTPSyncWihtHost/report.md and https://www.notion.so/TOTOLINK-X6000R-NTPSyncWithHost-2d170566ca7f803a8096c1b31b2ed42f?source=copy_link.

Details

CWE(s)

Affected Products

totolink
x6000r firmware
9.4.0cu.1498_b20250826

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.008 Network Device CLI Execution
Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads.
Why these techniques?

OS command injection in router's web interface (NTPSyncWithHost handler) enables exploitation of public-facing application for arbitrary shell command execution on network device CLI.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References