CVE-2025-6104
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-16

Last updated on: 2025-06-16

Assigner: VulDB

Description
A vulnerability, which was classified as critical, was found in Wifi-soft UniBox Controller up to 20250506. This affects an unknown part of the file /billing/pms_check.php. The manipulation of the argument ipaddress leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-16
Last Modified
2025-06-16
Generated
2026-05-07
AI Q&A
2025-06-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a critical OS command injection flaw in the Wifi-soft UniBox Controller up to version 20250506, specifically in the file /billing/pms_check.php. It occurs because the 'ipaddress' argument is improperly handled, allowing an attacker to inject and execute arbitrary operating system commands remotely. This can lead to unauthorized code execution on the server, enabling attackers to gain control over the router. [1, 2]


How can this vulnerability impact me? :

Exploitation of this vulnerability can allow attackers to execute arbitrary code on the affected system, potentially leading to writing backdoors, gaining full server permissions, and taking complete control over the router. This compromises the confidentiality, integrity, and availability of the system, posing a severe security risk. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of the vulnerable endpoint /billing/pms_check.php on Wifi-soft UniBox Controller devices. Attackers may use Google dorking with the query "inurl:billing/pms_check.php" to locate vulnerable targets. To detect exploitation attempts or scanning on your network, you can monitor web server logs for requests to /billing/pms_check.php with suspicious or unusual ipaddress parameter values that may contain OS command injection payloads. Specific commands to detect this vulnerability are not provided, but monitoring HTTP requests and logs for this endpoint is recommended. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include replacing the affected Wifi-soft UniBox Controller product with an alternative solution, as no patches or vendor mitigations are available. Additionally, restrict access to the vulnerable endpoint /billing/pms_check.php by implementing network-level controls such as firewall rules or access control lists to limit exposure. Monitoring and blocking suspicious requests targeting the ipaddress parameter can help reduce risk. Since the vendor has not responded and no fixes exist, removing or isolating the vulnerable device is strongly recommended. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart