type 5 passwords are really hard to crack, especially since Cisco uses I think the 'salted' version of the hash. That said, if you are willing to dive into some dark hacker cracker stuff, here are two links to scripts you can use (I hope posting those links does not earn me jail time):
Haven't tried it but there seems to be a few methods online
they say this works if password is weak
or another method to bypass it using solarwinds
or through python
In addition to the practical hints of Mark and Georg we should look at some background information:
There is no decryption as the passwords are not encrypted but hashed. Although it's also a cryptographic operation, it's not a reversible encryption but a one-way function. All you can do is to take many different passwords, hash them and compare the result to your given hash-value. The used hash-algorithm with type 5 is salted md5 which can be computed lightning fast on modern computers. If you know that the original password is not too complex and long, it should be possible with the given tools.
The triviality in computing md5-based hashes (and also that there can be collisions) make md5-hashed passwords a bad thing and nowadays (at least in newer IOS) pbkdf2 or scrypt is often used. These are the password-types 8 and 9.
Type 5 password are MD5 hashes. An MD5 Hash is just that. A hash is a one way function and cannot be decrypted. Only dictionary attacks work against a hash.