CVE-2018-25148

HIGH

Microhard Systems IPn4G 1.1.0 - Authenticated RCE

Title source: llm
STIX 2.1

Description

Microhard Systems IPn4G 1.1.0 contains multiple authenticated remote code execution vulnerabilities in the admin interface that allow attackers to create crontab jobs and modify system startup scripts. Attackers can exploit hidden admin features to execute arbitrary commands with root privileges, including starting services, disabling firewalls, and writing files to the system.

Exploits (1)

exploitdb WORKING POC
by LiquidWorm · textwebappshardware
https://www.exploit-db.com/exploits/45038

References (3)

Core 3
Core References
Exploit, Third Party Advisory third-party-advisory
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5479.php

Scores

CVSS v3 8.8
EPSS 0.0042
EPSS Percentile 61.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-266
Status published
Products (12)
microhardcorp/bullet-3g_firmware 1.2.0 reva_build1032 (2 CPE variants)
microhardcorp/bullet-lte_firmware 1.2.0 build1078
microhardcorp/bulletplus_firmware 1.3.0 build1036
microhardcorp/dragon-lte_firmware 1.1.0 build1036
microhardcorp/ipn3gb_firmware 2.2.0 build2160
microhardcorp/ipn3gii_firmware 1.2.0 build1076
microhardcorp/ipn4g_firmware 1.1.0 build1098
microhardcorp/ipn4gb_firmware 1.1.6 build1184-14
microhardcorp/ipn4gb_firmware 1.1.0 rev2_build1090-2 (2 CPE variants)
microhardcorp/ipn4gii_firmware 1.2.0 build1078
... and 2 more
Published Dec 24, 2025
Tracked Since Feb 18, 2026