Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26602 | An OS command injection vulnerability exists in PLDT WiFi Router's Prolink PGN6401V Firmware 8.1.2 web management interface. The ping6.asp page submits user input to the /boaform/formPing6 endpoint via the pingAddr parameter, which is not properly sanitized. An authenticated attacker can exploit this flaw by injecting arbitrary system commands, which are executed by the underlying operating system with root privileges. The router uses the Boa web server (version 0.93.15) to handle the request. Successful exploitation can lead to full system compromise and unauthorized control of the network device. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 09 Sep 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Prolink2u
Prolink2u pgn6401v Prolink2u pgn6401v Firmware |
|
| CPEs | cpe:2.3:h:prolink2u:pgn6401v:-:*:*:*:*:*:*:* cpe:2.3:o:prolink2u:pgn6401v_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Prolink2u
Prolink2u pgn6401v Prolink2u pgn6401v Firmware |
Wed, 03 Sep 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Boa
Boa boa |
|
| Vendors & Products |
Boa
Boa boa |
Wed, 03 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
cvssV3_1
|
Wed, 03 Sep 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in PLDT WiFi Router's Prolink PGN6401V Firmware 8.1.2 web management interface. The ping6.asp page submits user input to the /boaform/formPing6 endpoint via the pingAddr parameter, which is not properly sanitized. An authenticated attacker can exploit this flaw by injecting arbitrary system commands, which are executed by the underlying operating system with root privileges. The router uses the Boa web server (version 0.93.15) to handle the request. Successful exploitation can lead to full system compromise and unauthorized control of the network device. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-03T20:03:01.578Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-56498
Updated: 2025-09-03T20:02:56.480Z
Status : Analyzed
Published: 2025-09-03T16:15:40.193
Modified: 2025-09-09T15:58:46.043
Link: CVE-2025-56498
No data.
OpenCVE Enrichment
Updated: 2025-09-03T20:26:47Z
EUVD