CVE-2018-25144

EUVD-2025-205330
Microhard Systems IPn4G 1.1.0 contains an authentication bypass vulnerability in the hidden system-editor.sh script that allows authenticated attackers to read, modify, or delete arbitrary files. Attackers can exploit unsanitized 'path', 'savefile', 'edit', and 'delfile' parameters to perform unauthorized file system modifications through GET and POST requests.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.4 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
VulnCheckCNA
8.4 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 42%
Affected Products (NVD)
VendorProductVersion
microhardcorpipn4g_firmware
1.1.0:build1098
microhardcorpipn3gb_firmware
2.2.0:build2160
microhardcorpipn4gb_firmware
1.1.6:build1184-14
microhardcorpipn4gb_firmware
1.1.0:rev2_build1090-2
microhardcorpipn4gb_firmware
1.1.0:rev2_build1086
microhardcorpbullet-3g_firmware
1.2.0:reva_build1032
microhardcorpvip4gb_firmware
1.1.6:build_1204
microhardcorpvip4gb_firmware
1.1.6:rev3_build1184-14
microhardcorpvip4gb_wifi-n_firmware
1.1.6:rev2_build1196
microhardcorpbullet-3g_firmware
1.2.0:build1076
microhardcorpbullet-lte_firmware
1.2.0:build1078
microhardcorpipn3gii_firmware
1.2.0:build1076
microhardcorpipn4gii_firmware
1.2.0:build1078
microhardcorpbulletplus_firmware
1.3.0:build1036
microhardcorpdragon-lte_firmware
1.1.0:build1036
𝑥
= Vulnerable software versions