Remote Code Execution Vulnerabilities in Microhard Systems IPn4G
CVE-2018-25148
Key Information:
- Vendor
Microhard Systems
- Vendor
- CVE Published:
- 24 December 2025
Badges
What is CVE-2018-25148?
Microhard Systems IPn4G version 1.1.0 is susceptible to multiple remote code execution vulnerabilities through its admin interface. These flaws allow authenticated attackers to exploit hidden administrative features, enabling them to create crontab jobs and alter system startup scripts. With root privileges, attackers can execute arbitrary commands, potentially starting services, disabling firewalls, and writing malicious files to the system, leading to significant security breaches.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Remote Root Exploit IPn4G 1.1.0 build 1098
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
