Authentication Bypass in Microhard Systems IPn4G Device
CVE-2018-25144

8.7HIGH

Key Information:

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2018-25144?

Microhard Systems IPn4G version 1.1.0 has a vulnerability that allows authenticated attackers to bypass authentication through a hidden script named system-editor.sh. This weakness enables attackers to read, modify, or delete files on the system. The exploit occurs due to unsanitized parameters—'path', 'savefile', 'edit', and 'delfile'—which can be manipulated through GET and POST requests, leading to unauthorized file system changes. It's crucial for users of this device to apply necessary security patches to mitigate this risk.

Affected Version(s)

Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Arbitrary File Attacks IPn4G 1.1.0 build 1098

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

LiquidWorm as Gjoko Krstic of Zero Science Lab
.
CVE-2018-25144 : Authentication Bypass in Microhard Systems IPn4G Device