Vulnerability Details CVE-2018-25148
Microhard Systems IPn4G 1.1.0 contains multiple authenticated remote code execution vulnerabilities in the admin interface that allow attackers to create crontab jobs and modify system startup scripts. Attackers can exploit hidden admin features to execute arbitrary commands with root privileges, including starting services, disabling firewalls, and writing files to the system.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 47.2%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2018-25148
-
cpe:2.3:h:microhardcorp:bullet-3g:-
-
cpe:2.3:h:microhardcorp:bullet-lte:-
-
cpe:2.3:h:microhardcorp:bulletplus:-
-
cpe:2.3:h:microhardcorp:dragon-lte:-
-
cpe:2.3:h:microhardcorp:ipn3gb:-
-
cpe:2.3:h:microhardcorp:ipn3gii:-
-
cpe:2.3:h:microhardcorp:ipn4g:-
-
cpe:2.3:h:microhardcorp:ipn4gb:-
-
cpe:2.3:h:microhardcorp:ipn4gii:-
-
cpe:2.3:h:microhardcorp:vip4gb:-
-
cpe:2.3:h:microhardcorp:vip4gb_wifi-n:-
-
cpe:2.3:o:microhardcorp:bullet-3g_firmware:1.2.0
-
cpe:2.3:o:microhardcorp:bullet-lte_firmware:1.2.0
-
cpe:2.3:o:microhardcorp:bulletplus_firmware:1.3.0
-
cpe:2.3:o:microhardcorp:dragon-lte_firmware:1.1.0
-
cpe:2.3:o:microhardcorp:ipn3gb_firmware:2.2.0
-
cpe:2.3:o:microhardcorp:ipn3gii_firmware:1.2.0
-
cpe:2.3:o:microhardcorp:ipn4g_firmware:1.1.0
-
cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.0
-
cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.6
-
cpe:2.3:o:microhardcorp:ipn4gii_firmware:1.2.0
-
cpe:2.3:o:microhardcorp:vip4gb_firmware:1.1.6
-
cpe:2.3:o:microhardcorp:vip4gb_wifi-n_firmware:1.1.6