Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Dec 24, 2025
Microhard Systems IPn4G 1.1.0 Remote Code Execution via Admin Interface
CVE-2018-25148
Description
Microhard Systems IPn4G 1.1.0 contains multiple authenticated remote code execution vulnerabilities in the admin interface that allow attackers to create crontab jobs and modify system startup scripts. Attackers can exploit hidden admin features to execute arbitrary commands with root privileges, including starting services, disabling firewalls, and writing files to the system.
Affected products
2- Range: = 1.1.0
- Microhard Systems/Microhard Systems 3g/4g Cellular Ethernet And Serial Gateway Remote Root Exploitv5Range: IPn4G 1.1.0 build 1098
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.exploit-db.com/exploits/45038mitreexploit
- www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5479.phpmitrethird-party-advisory
- www.microhardcorp.commitreproduct
News mentions
0No linked articles in our index yet.