Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:totolink:x5000r_firmware:*:*:*:*:*:*:*:* |
Thu, 18 Dec 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink x5000r Firmware
|
|
| CPEs | cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2089_b20211224:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink x5000r Firmware
|
Mon, 15 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 14 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink x5000r |
|
| Vendors & Products |
Totolink
Totolink x5000r |
Sat, 13 Dec 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in TOTOLINK X5000R 9.1.0cu.2089_B20211224. Affected by this issue is the function snprintf of the file /cgi-bin/cstecgi.cgi?action=exportOvpn&type=user. This manipulation of the argument User causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. | |
| Title | TOTOLINK X5000R cstecgi.cgi snprintf os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T05:48:28.365Z
Reserved: 2025-12-12T14:55:14.214Z
Link: CVE-2025-14586
Updated: 2025-12-15T17:45:31.476Z
Status : Analyzed
Published: 2025-12-13T16:16:51.713
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-14586
No data.
OpenCVE Enrichment
Updated: 2025-12-14T21:14:37Z