CVE-2018-25147

HIGH

Microhard Systems IPn4G 1.1.0 - Privilege Escalation

Title source: llm

Description

Microhard Systems IPn4G 1.1.0 contains hardcoded default credentials that cannot be changed through normal gateway operations. Attackers can exploit these default credentials to gain unauthorized root-level access to the device by logging in with predefined username and password combinations.

Exploits (1)

exploitdb WRITEUP
by LiquidWorm · textremotehardware
https://www.exploit-db.com/exploits/45040

Scores

CVSS v3 7.5
EPSS 0.0006
EPSS Percentile 17.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Classification

CWE
CWE-1392
Status published

Affected Products (15)

microhardcorp/ipn4g_firmware
microhardcorp/ipn3gb_firmware
microhardcorp/ipn4gb_firmware
microhardcorp/ipn4gb_firmware
microhardcorp/ipn4gb_firmware
microhardcorp/bullet-3g_firmware
microhardcorp/vip4gb_firmware
microhardcorp/vip4gb_firmware
microhardcorp/vip4gb_wifi-n_firmware
microhardcorp/bullet-3g_firmware
microhardcorp/bullet-lte_firmware
microhardcorp/ipn3gii_firmware
microhardcorp/ipn4gii_firmware
microhardcorp/bulletplus_firmware
microhardcorp/dragon-lte_firmware

Timeline

Published Dec 24, 2025
Tracked Since Feb 18, 2026