Authentication Bypass in Microhard Systems IPn4G Device
CVE-2018-25144
Key Information:
- Vendor
Microhard Systems
- Vendor
- CVE Published:
- 24 December 2025
Badges
What is CVE-2018-25144?
Microhard Systems IPn4G version 1.1.0 has a vulnerability that allows authenticated attackers to bypass authentication through a hidden script named system-editor.sh. This weakness enables attackers to read, modify, or delete files on the system. The exploit occurs due to unsanitized parameters—'path', 'savefile', 'edit', and 'delfile'—which can be manipulated through GET and POST requests, leading to unauthorized file system changes. It's crucial for users of this device to apply necessary security patches to mitigate this risk.
Affected Version(s)
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Arbitrary File Attacks IPn4G 1.1.0 build 1098
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
