Microhard Systems IPn4G 1.1.0 contains an authentication bypass vulnerability in the hidden system-editor.sh script that allows authenticated attackers to read, modify, or delete arbitrary files. Attackers can exploit unsanitized 'path', 'savefile', 'edit', and 'delfile' parameters to perform unauthorized file system modifications through GET and POST requests.
References
| Link | Resource |
|---|---|
| http://www.microhardcorp.com | Product |
| https://www.exploit-db.com/exploits/45037 | Exploit |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5485.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5485.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
| AND |
|
Configuration 9 (hide)
| AND |
|
Configuration 10 (hide)
| AND |
|
Configuration 11 (hide)
| AND |
|
Configuration 12 (hide)
| AND |
|
Configuration 13 (hide)
| AND |
|
Configuration 14 (hide)
| AND |
|
Configuration 15 (hide)
| AND |
|
History
02 Feb 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.4 |
26 Jan 2026, 19:51
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Microhardcorp ipn4g Firmware
Microhardcorp bullet-lte Microhardcorp dragon-lte Microhardcorp dragon-lte Firmware Microhardcorp bulletplus Microhardcorp ipn3gb Microhardcorp Microhardcorp ipn3gii Firmware Microhardcorp vip4gb Microhardcorp vip4gb Wifi-n Firmware Microhardcorp bulletplus Firmware Microhardcorp ipn4gb Firmware Microhardcorp bullet-lte Firmware Microhardcorp ipn4gii Microhardcorp ipn4gii Firmware Microhardcorp ipn4gb Microhardcorp ipn3gb Firmware Microhardcorp bullet-3g Microhardcorp bullet-3g Firmware Microhardcorp vip4gb Firmware Microhardcorp vip4gb Wifi-n Microhardcorp ipn3gii Microhardcorp ipn4g |
|
| References | () http://www.microhardcorp.com - Product | |
| References | () https://www.exploit-db.com/exploits/45037 - Exploit | |
| References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5485.php - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:o:microhardcorp:bullet-3g_firmware:1.2.0:build1076:*:*:*:*:*:* cpe:2.3:h:microhardcorp:bulletplus:-:*:*:*:*:*:*:* cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.0:rev2_build1086:*:*:*:*:*:* cpe:2.3:o:microhardcorp:vip4gb_firmware:1.1.6:build_1204:*:*:*:*:*:* cpe:2.3:h:microhardcorp:ipn4g:-:*:*:*:*:*:*:* cpe:2.3:o:microhardcorp:dragon-lte_firmware:1.1.0:build1036:*:*:*:*:*:* cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.6:build1184-14:*:*:*:*:*:* cpe:2.3:o:microhardcorp:bullet-3g_firmware:1.2.0:reva_build1032:*:*:*:*:*:* cpe:2.3:h:microhardcorp:dragon-lte:-:*:*:*:*:*:*:* cpe:2.3:h:microhardcorp:bullet-3g:-:*:*:*:*:*:*:* cpe:2.3:h:microhardcorp:ipn4gii:-:*:*:*:*:*:*:* cpe:2.3:o:microhardcorp:ipn4g_firmware:1.1.0:build1098:*:*:*:*:*:* cpe:2.3:o:microhardcorp:ipn3gb_firmware:2.2.0:build2160:*:*:*:*:*:* cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.0:rev2_build1090-2:*:*:*:*:*:* cpe:2.3:h:microhardcorp:ipn3gii:-:*:*:*:*:*:*:* cpe:2.3:o:microhardcorp:vip4gb_firmware:1.1.6:rev3_build1184-14:*:*:*:*:*:* cpe:2.3:h:microhardcorp:bullet-lte:-:*:*:*:*:*:*:* cpe:2.3:h:microhardcorp:ipn3gb:-:*:*:*:*:*:*:* cpe:2.3:o:microhardcorp:bulletplus_firmware:1.3.0:build1036:*:*:*:*:*:* cpe:2.3:h:microhardcorp:vip4gb_wifi-n:-:*:*:*:*:*:*:* cpe:2.3:o:microhardcorp:vip4gb_wifi-n_firmware:1.1.6:rev2_build1196:*:*:*:*:*:* cpe:2.3:h:microhardcorp:vip4gb:-:*:*:*:*:*:*:* cpe:2.3:h:microhardcorp:ipn4gb:-:*:*:*:*:*:*:* cpe:2.3:o:microhardcorp:ipn4gii_firmware:1.2.0:build1078:*:*:*:*:*:* cpe:2.3:o:microhardcorp:bullet-lte_firmware:1.2.0:build1078:*:*:*:*:*:* cpe:2.3:o:microhardcorp:ipn3gii_firmware:1.2.0:build1076:*:*:*:*:*:* |
24 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5485.php - |
24 Dec 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-24 20:15
Updated : 2026-02-02 16:16
NVD link : CVE-2018-25144
Mitre link : CVE-2018-25144
CVE.ORG link : CVE-2018-25144
JSON object : View
Products Affected
microhardcorp
- ipn4gb_firmware
- bullet-3g_firmware
- ipn4gb
- ipn3gii_firmware
- vip4gb
- bulletplus_firmware
- dragon-lte_firmware
- bullet-lte_firmware
- ipn4gii
- bullet-lte
- ipn4gii_firmware
- ipn4g_firmware
- vip4gb_wifi-n_firmware
- ipn3gb_firmware
- dragon-lte
- bullet-3g
- ipn4g
- bulletplus
- ipn3gb
- vip4gb_wifi-n
- ipn3gii
- vip4gb_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
