Description

An OS command injection vulnerability exists in PLDT WiFi Router's Prolink PGN6401V Firmware 8.1.2 web management interface. The ping6.asp page submits user input to the /boaform/formPing6 endpoint via the pingAddr parameter, which is not properly sanitized. An authenticated attacker can exploit this flaw by injecting arbitrary system commands, which are executed by the underlying operating system with root privileges. The router uses the Boa web server (version 0.93.15) to handle the request. Successful exploitation can lead to full system compromise and unauthorized control of the network device.

INFO

Published Date :

2025-09-03T00:00:00.000Z

Last Modified :

2025-09-03T20:03:01.578Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-56498 vulnerability.

Vendors Products
Boa
  • Boa
Prolink2u
  • Pgn6401v
  • Pgn6401v Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-56498.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact