Microhard Systems IPn4G 1.1.0 contains multiple authenticated remote code execution vulnerabilities in the admin interface that allow attackers to create crontab jobs and modify system startup scripts. Attackers can exploit hidden admin features to execute arbitrary commands with root privileges, including starting services, disabling firewalls, and writing files to the system.
PUBLISHED5.2CWE-266
Microhard Systems IPn4G 1.1.0 Remote Code Execution via Admin Interface
Problem type
Affected products
Microhard Systems
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Remote Root Exploit
IPn4G 1.1.0 build 1098 - AFFECTED
References
ExploitDB-45038
https://www.exploit-db.com/exploits/45038
Microhard Systems Product Web Page
http://www.microhardcorp.com
Zero Science Lab Disclosure (ZSL-2018-5479)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5479.php
GitHub Security Advisories
GHSA-jmmc-j836-r5v7
Microhard Systems IPn4G 1.1.0 contains multiple authenticated remote code execution...
https://github.com/advisories/GHSA-jmmc-j836-r5v7Microhard Systems IPn4G 1.1.0 contains multiple authenticated remote code execution vulnerabilities in the admin interface that allow attackers to create crontab jobs and modify system startup scripts. Attackers can exploit hidden admin features to execute arbitrary commands with root privileges, including starting services, disabling firewalls, and writing files to the system.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2018-25148Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2018-25148",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2025-12-24T20:25:14.760Z",
"dateReserved": "2025-12-24T14:28:02.435Z",
"datePublished": "2025-12-24T19:27:50.947Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2025-12-24T19:27:50.947Z"
},
"datePublic": "2018-03-13T00:00:00.000Z",
"title": "Microhard Systems IPn4G 1.1.0 Remote Code Execution via Admin Interface",
"descriptions": [
{
"lang": "en",
"value": "Microhard Systems IPn4G 1.1.0 contains multiple authenticated remote code execution vulnerabilities in the admin interface that allow attackers to create crontab jobs and modify system startup scripts. Attackers can exploit hidden admin features to execute arbitrary commands with root privileges, including starting services, disabling firewalls, and writing files to the system."
}
],
"affected": [
{
"vendor": "Microhard Systems",
"product": "Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Remote Root Exploit",
"versions": [
{
"version": "IPn4G 1.1.0 build 1098",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Incorrect Privilege Assignment",
"cweId": "CWE-266",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/45038",
"name": "ExploitDB-45038",
"tags": [
"exploit"
]
},
{
"url": "http://www.microhardcorp.com",
"name": "Microhard Systems Product Web Page",
"tags": [
"product"
]
},
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5479.php",
"name": "Zero Science Lab Disclosure (ZSL-2018-5479)",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS"
},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "LiquidWorm as Gjoko Krstic of Zero Science Lab",
"type": "finder"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-12-24T20:25:14.760Z"
},
"title": "CISA ADP Vulnrichment",
"references": [
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5479.php",
"tags": [
"exploit"
]
}
],
"metrics": [
{}
]
}
]
}
}