CVE-2025-56498 – PLDT WiFi Router PLDT WiFi Router OS Command Injection

The following table lists the changes that have been made to the
CVE-2025-56498 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Sep. 03, 2025

    Action Type Old Value New Value
    Added Description An OS command injection vulnerability exists in PLDT WiFi Router’s Prolink PGN6401V Firmware 8.1.2 web management interface. The ping6.asp page submits user input to the /boaform/formPing6 endpoint via the pingAddr parameter, which is not properly sanitized. An authenticated attacker can exploit this flaw by injecting arbitrary system commands, which are executed by the underlying operating system with root privileges. The router uses the Boa web server (version 0.93.15) to handle the request. Successful exploitation can lead to full system compromise and unauthorized control of the network device.
    Added Reference https://github.com/Jorge2Rubio/CVEs/blob/main/CVE-2025-56498.md
    Added Reference https://prolink2u.com/products/pgn6401v
Share the Post:

Related Posts