CVE-2018-25143

EUVD-2025-205326
Microhard Systems IPn4G 1.1.0 contains a service vulnerability that allows authenticated users to enable a restricted SSH shell with a default 'msshc' user. Attackers can exploit a custom 'ping' command in the NcFTP environment to escape the restricted shell and execute commands with root privileges.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
VulnCheckCNA
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 30%
Affected Products (NVD)
VendorProductVersion
microhardcorpipn4g_firmware
1.1.0:build1098
microhardcorpipn3gb_firmware
2.2.0:build2160
microhardcorpipn4gb_firmware
1.1.6:build1184-14
microhardcorpipn4gb_firmware
1.1.0:rev2_build1090-2
microhardcorpipn4gb_firmware
1.1.0:rev2_build1086
microhardcorpbullet-3g_firmware
1.2.0:reva_build1032
microhardcorpvip4gb_firmware
1.1.6:build_1204
microhardcorpvip4gb_firmware
1.1.6:rev3_build1184-14
microhardcorpvip4gb_wifi-n_firmware
1.1.6:rev2_build1196
microhardcorpbullet-3g_firmware
1.2.0:build1076
microhardcorpbullet-lte_firmware
1.2.0:build1078
microhardcorpipn3gii_firmware
1.2.0:build1076
microhardcorpipn4gii_firmware
1.2.0:build1078
microhardcorpbulletplus_firmware
1.3.0:build1036
microhardcorpdragon-lte_firmware
1.1.0:build1036
𝑥
= Vulnerable software versions