Vulnerability Details CVE-2018-25143
Microhard Systems IPn4G 1.1.0 contains a service vulnerability that allows authenticated users to enable a restricted SSH shell with a default 'msshc' user. Attackers can exploit a custom 'ping' command in the NcFTP environment to escape the restricted shell and execute commands with root privileges.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 28.8%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2018-25143
-
cpe:2.3:h:microhardcorp:bullet-3g:-
-
cpe:2.3:h:microhardcorp:bullet-lte:-
-
cpe:2.3:h:microhardcorp:bulletplus:-
-
cpe:2.3:h:microhardcorp:dragon-lte:-
-
cpe:2.3:h:microhardcorp:ipn3gb:-
-
cpe:2.3:h:microhardcorp:ipn3gii:-
-
cpe:2.3:h:microhardcorp:ipn4g:-
-
cpe:2.3:h:microhardcorp:ipn4gb:-
-
cpe:2.3:h:microhardcorp:ipn4gii:-
-
cpe:2.3:h:microhardcorp:vip4gb:-
-
cpe:2.3:h:microhardcorp:vip4gb_wifi-n:-
-
cpe:2.3:o:microhardcorp:bullet-3g_firmware:1.2.0
-
cpe:2.3:o:microhardcorp:bullet-lte_firmware:1.2.0
-
cpe:2.3:o:microhardcorp:bulletplus_firmware:1.3.0
-
cpe:2.3:o:microhardcorp:dragon-lte_firmware:1.1.0
-
cpe:2.3:o:microhardcorp:ipn3gb_firmware:2.2.0
-
cpe:2.3:o:microhardcorp:ipn3gii_firmware:1.2.0
-
cpe:2.3:o:microhardcorp:ipn4g_firmware:1.1.0
-
cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.0
-
cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.6
-
cpe:2.3:o:microhardcorp:ipn4gii_firmware:1.2.0
-
cpe:2.3:o:microhardcorp:vip4gb_firmware:1.1.6
-
cpe:2.3:o:microhardcorp:vip4gb_wifi-n_firmware:1.1.6