CVE-2025-6104
BaseFortify
Publication date: 2025-06-16
Last updated on: 2025-06-16
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a critical OS command injection flaw in the Wifi-soft UniBox Controller up to version 20250506, specifically in the file /billing/pms_check.php. It occurs because the 'ipaddress' argument is improperly handled, allowing an attacker to inject and execute arbitrary operating system commands remotely. This can lead to unauthorized code execution on the server, enabling attackers to gain control over the router. [1, 2]
How can this vulnerability impact me? :
Exploitation of this vulnerability can allow attackers to execute arbitrary code on the affected system, potentially leading to writing backdoors, gaining full server permissions, and taking complete control over the router. This compromises the confidentiality, integrity, and availability of the system, posing a severe security risk. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of the vulnerable endpoint /billing/pms_check.php on Wifi-soft UniBox Controller devices. Attackers may use Google dorking with the query "inurl:billing/pms_check.php" to locate vulnerable targets. To detect exploitation attempts or scanning on your network, you can monitor web server logs for requests to /billing/pms_check.php with suspicious or unusual ipaddress parameter values that may contain OS command injection payloads. Specific commands to detect this vulnerability are not provided, but monitoring HTTP requests and logs for this endpoint is recommended. [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include replacing the affected Wifi-soft UniBox Controller product with an alternative solution, as no patches or vendor mitigations are available. Additionally, restrict access to the vulnerable endpoint /billing/pms_check.php by implementing network-level controls such as firewall rules or access control lists to limit exposure. Monitoring and blocking suspicious requests targeting the ipaddress parameter can help reduce risk. Since the vendor has not responded and no fixes exist, removing or isolating the vulnerable device is strongly recommended. [2]