Vulnerability Description
An OS command injection vulnerability exists in PLDT WiFi Router's Prolink PGN6401V Firmware 8.1.2 web management interface. The ping6.asp page submits user input to the /boaform/formPing6 endpoint via the pingAddr parameter, which is not properly sanitized. An authenticated attacker can exploit this flaw by injecting arbitrary system commands, which are executed by the underlying operating system with root privileges. The router uses the Boa web server (version 0.93.15) to handle the request. Successful exploitation can lead to full system compromise and unauthorized control of the network device.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Prolink2U | Pgn6401V Firmware | <= 8.1.2 |
| Prolink2U | Pgn6401V | - |
Related Weaknesses (CWE)
References
- https://github.com/Jorge2Rubio/CVEs/blob/main/CVE-2025-56498.mdExploitThird Party Advisory
- https://prolink2u.com/products/pgn6401vProduct
FAQ
What is CVE-2025-56498?
CVE-2025-56498 is a vulnerability with a CVSS score of 5.3 (MEDIUM). An OS command injection vulnerability exists in PLDT WiFi Router's Prolink PGN6401V Firmware 8.1.2 web management interface. The ping6.asp page submits user input to the /boaform/formPing6 endpoint vi...
How severe is CVE-2025-56498?
CVE-2025-56498 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-56498?
Check the references section above for vendor advisories and patch information. Affected products include: Prolink2U Pgn6401V Firmware, Prolink2U Pgn6401V.