Description
Microhard Systems IPn4G 1.1.0 contains multiple authenticated remote code execution vulnerabilities in the admin interface that allow attackers to create crontab jobs and modify system startup scripts. Attackers can exploit hidden admin features to execute arbitrary commands with root privileges, including starting services, disabling firewalls, and writing files to the system.
Exploits (1)
References (3)
Core 3
Core References
Exploit exploit
https://www.exploit-db.com/exploits/45038
Product product
http://www.microhardcorp.com
Exploit, Third Party Advisory third-party-advisory
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5479.php
Scores
CVSS v3
8.8
EPSS
0.0042
EPSS Percentile
61.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-266
Status
published
Products (12)
microhardcorp/bullet-3g_firmware
1.2.0 reva_build1032 (2 CPE variants)
microhardcorp/bullet-lte_firmware
1.2.0 build1078
microhardcorp/bulletplus_firmware
1.3.0 build1036
microhardcorp/dragon-lte_firmware
1.1.0 build1036
microhardcorp/ipn3gb_firmware
2.2.0 build2160
microhardcorp/ipn3gii_firmware
1.2.0 build1076
microhardcorp/ipn4g_firmware
1.1.0 build1098
microhardcorp/ipn4gb_firmware
1.1.6 build1184-14
microhardcorp/ipn4gb_firmware
1.1.0 rev2_build1090-2 (2 CPE variants)
microhardcorp/ipn4gii_firmware
1.2.0 build1078
... and 2 more
Published
Dec 24, 2025
Tracked Since
Feb 18, 2026