CVE-2025-56498
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
03/09/2025
Last modified:
09/09/2025
Description
An OS command injection vulnerability exists in PLDT WiFi Router's Prolink PGN6401V Firmware 8.1.2 web management interface. The ping6.asp page submits user input to the /boaform/formPing6 endpoint via the pingAddr parameter, which is not properly sanitized. An authenticated attacker can exploit this flaw by injecting arbitrary system commands, which are executed by the underlying operating system with root privileges. The router uses the Boa web server (version 0.93.15) to handle the request. Successful exploitation can lead to full system compromise and unauthorized control of the network device.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:prolink2u:pgn6401v_firmware:*:*:*:*:*:*:*:* | 8.1.2 (including) | |
| cpe:2.3:h:prolink2u:pgn6401v:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



