Description
Microhard Systems IPn4G 1.1.0 contains hardcoded default credentials that cannot be changed through normal gateway operations. Attackers can exploit these default credentials to gain unauthorized root-level access to the device by logging in with predefined username and password combinations.
Exploits (1)
Scores
CVSS v3
7.5
EPSS
0.0007
EPSS Percentile
21.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-1392
Status
published
Products (12)
microhardcorp/bullet-3g_firmware
1.2.0 reva_build1032 (2 CPE variants)
microhardcorp/bullet-lte_firmware
1.2.0 build1078
microhardcorp/bulletplus_firmware
1.3.0 build1036
microhardcorp/dragon-lte_firmware
1.1.0 build1036
microhardcorp/ipn3gb_firmware
2.2.0 build2160
microhardcorp/ipn3gii_firmware
1.2.0 build1076
microhardcorp/ipn4g_firmware
1.1.0 build1098
microhardcorp/ipn4gb_firmware
1.1.6 build1184-14
microhardcorp/ipn4gb_firmware
1.1.0 rev2_build1090-2 (2 CPE variants)
microhardcorp/ipn4gii_firmware
1.2.0 build1078
... and 2 more
Published
Dec 24, 2025
Tracked Since
Feb 18, 2026