CVE-2018-25148

Microhard Systems IPn4G 1.1.0 contains multiple authenticated remote code execution vulnerabilities in the admin interface that allow attackers to create crontab jobs and modify system startup scripts. Attackers can exploit hidden admin features to execute arbitrary commands with root privileges, including starting services, disabling firewalls, and writing files to the system.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:microhardcorp:ipn4g_firmware:1.1.0:build1098:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn4g:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:microhardcorp:ipn3gb_firmware:2.2.0:build2160:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn3gb:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.6:build1184-14:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn4gb:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.0:rev2_build1090-2:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn4gb:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.0:rev2_build1086:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn4gb:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:microhardcorp:bullet-3g_firmware:1.2.0:reva_build1032:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:bullet-3g:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:microhardcorp:vip4gb_firmware:1.1.6:build_1204:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:vip4gb:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:microhardcorp:vip4gb_firmware:1.1.6:rev3_build1184-14:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:vip4gb:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:microhardcorp:vip4gb_wifi-n_firmware:1.1.6:rev2_build1196:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:vip4gb_wifi-n:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:microhardcorp:bullet-3g_firmware:1.2.0:build1076:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:bullet-3g:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:microhardcorp:bullet-lte_firmware:1.2.0:build1078:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:bullet-lte:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:microhardcorp:ipn3gii_firmware:1.2.0:build1076:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn3gii:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:microhardcorp:ipn4gii_firmware:1.2.0:build1078:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn4gii:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:microhardcorp:bulletplus_firmware:1.3.0:build1036:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:bulletplus:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:microhardcorp:dragon-lte_firmware:1.1.0:build1036:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:dragon-lte:-:*:*:*:*:*:*:*

History

21 Jan 2026, 20:00

Type Values Removed Values Added
References () http://www.microhardcorp.com - () http://www.microhardcorp.com - Product
References () https://www.exploit-db.com/exploits/45038 - () https://www.exploit-db.com/exploits/45038 - Exploit
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5479.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5479.php - Exploit, Third Party Advisory
First Time Microhardcorp ipn4g Firmware
Microhardcorp bullet-lte
Microhardcorp dragon-lte
Microhardcorp dragon-lte Firmware
Microhardcorp bulletplus
Microhardcorp ipn3gb
Microhardcorp
Microhardcorp ipn3gii Firmware
Microhardcorp vip4gb
Microhardcorp vip4gb Wifi-n Firmware
Microhardcorp bulletplus Firmware
Microhardcorp ipn4gb Firmware
Microhardcorp bullet-lte Firmware
Microhardcorp ipn4gii
Microhardcorp ipn4gii Firmware
Microhardcorp ipn4gb
Microhardcorp ipn3gb Firmware
Microhardcorp bullet-3g
Microhardcorp bullet-3g Firmware
Microhardcorp vip4gb Firmware
Microhardcorp vip4gb Wifi-n
Microhardcorp ipn3gii
Microhardcorp ipn4g
CPE cpe:2.3:o:microhardcorp:bullet-3g_firmware:1.2.0:build1076:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:bulletplus:-:*:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.0:rev2_build1086:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:vip4gb_firmware:1.1.6:build_1204:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn4g:-:*:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:dragon-lte_firmware:1.1.0:build1036:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.6:build1184-14:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:bullet-3g_firmware:1.2.0:reva_build1032:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:dragon-lte:-:*:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:bullet-3g:-:*:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn4gii:-:*:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:ipn4g_firmware:1.1.0:build1098:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:ipn3gb_firmware:2.2.0:build2160:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.0:rev2_build1090-2:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn3gii:-:*:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:vip4gb_firmware:1.1.6:rev3_build1184-14:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:bullet-lte:-:*:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn3gb:-:*:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:bulletplus_firmware:1.3.0:build1036:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:vip4gb_wifi-n:-:*:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:vip4gb_wifi-n_firmware:1.1.6:rev2_build1196:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:vip4gb:-:*:*:*:*:*:*:*
cpe:2.3:h:microhardcorp:ipn4gb:-:*:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:ipn4gii_firmware:1.2.0:build1078:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:bullet-lte_firmware:1.2.0:build1078:*:*:*:*:*:*
cpe:2.3:o:microhardcorp:ipn3gii_firmware:1.2.0:build1076:*:*:*:*:*:*

24 Dec 2025, 21:16

Type Values Removed Values Added
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5479.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5479.php -

24 Dec 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-24 20:15

Updated : 2026-01-21 20:00


NVD link : CVE-2018-25148

Mitre link : CVE-2018-25148

CVE.ORG link : CVE-2018-25148


JSON object : View

Products Affected

microhardcorp

  • ipn4gb_firmware
  • bullet-3g_firmware
  • ipn4gb
  • ipn3gii_firmware
  • vip4gb
  • bulletplus_firmware
  • dragon-lte_firmware
  • bullet-lte_firmware
  • ipn4gii
  • bullet-lte
  • ipn4gii_firmware
  • ipn4g_firmware
  • vip4gb_wifi-n_firmware
  • ipn3gb_firmware
  • dragon-lte
  • bullet-3g
  • ipn4g
  • bulletplus
  • ipn3gb
  • vip4gb_wifi-n
  • ipn3gii
  • vip4gb_firmware
CWE
CWE-266

Incorrect Privilege Assignment