CVE-2018-25143
EUVD-2025-20532624.12.2025, 20:15
Microhard Systems IPn4G 1.1.0 contains a service vulnerability that allows authenticated users to enable a restricted SSH shell with a default 'msshc' user. Attackers can exploit a custom 'ping' command in the NcFTP environment to escape the restricted shell and execute commands with root privileges.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| microhardcorp | ipn4g_firmware | 1.1.0:build1098 |
| microhardcorp | ipn3gb_firmware | 2.2.0:build2160 |
| microhardcorp | ipn4gb_firmware | 1.1.6:build1184-14 |
| microhardcorp | ipn4gb_firmware | 1.1.0:rev2_build1090-2 |
| microhardcorp | ipn4gb_firmware | 1.1.0:rev2_build1086 |
| microhardcorp | bullet-3g_firmware | 1.2.0:reva_build1032 |
| microhardcorp | vip4gb_firmware | 1.1.6:build_1204 |
| microhardcorp | vip4gb_firmware | 1.1.6:rev3_build1184-14 |
| microhardcorp | vip4gb_wifi-n_firmware | 1.1.6:rev2_build1196 |
| microhardcorp | bullet-3g_firmware | 1.2.0:build1076 |
| microhardcorp | bullet-lte_firmware | 1.2.0:build1078 |
| microhardcorp | ipn3gii_firmware | 1.2.0:build1076 |
| microhardcorp | ipn4gii_firmware | 1.2.0:build1078 |
| microhardcorp | bulletplus_firmware | 1.3.0:build1036 |
| microhardcorp | dragon-lte_firmware | 1.1.0:build1036 |
𝑥
= Vulnerable software versions