CVE-2025-56498

An OS command injection vulnerability exists in PLDT WiFi Router's Prolink PGN6401V Firmware 8.1.2 web management interface. The ping6.asp page submits user input to the /boaform/formPing6 endpoint via the pingAddr parameter, which is not properly sanitized. An authenticated attacker can exploit this flaw by injecting arbitrary system commands, which are executed by the underlying operating system with root privileges. The router uses the Boa web server (version 0.93.15) to handle the request. Successful exploitation can lead to full system compromise and unauthorized control of the network device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:prolink2u:pgn6401v_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:prolink2u:pgn6401v:-:*:*:*:*:*:*:*

History

09 Sep 2025, 15:58

Type Values Removed Values Added
CPE cpe:2.3:o:prolink2u:pgn6401v_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:prolink2u:pgn6401v:-:*:*:*:*:*:*:*
First Time Prolink2u pgn6401v
Prolink2u pgn6401v Firmware
Prolink2u
References () https://github.com/Jorge2Rubio/CVEs/blob/main/CVE-2025-56498.md - () https://github.com/Jorge2Rubio/CVEs/blob/main/CVE-2025-56498.md - Exploit, Third Party Advisory
References () https://prolink2u.com/products/pgn6401v - () https://prolink2u.com/products/pgn6401v - Product

03 Sep 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CWE CWE-78

03 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-03 16:15

Updated : 2025-09-09 15:58


NVD link : CVE-2025-56498

Mitre link : CVE-2025-56498

CVE.ORG link : CVE-2025-56498


JSON object : View

Products Affected

prolink2u

  • pgn6401v
  • pgn6401v_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')