CVE-2018-25145
EUVD-2025-20533324.12.2025, 20:15
Microhard Systems IPn4G 1.1.0 contains a configuration file disclosure vulnerability that allows authenticated attackers to download sensitive system configuration files. Attackers can retrieve configuration files from multiple directories including '/www', '/etc/m_cli/', and '/tmp' to access system passwords and network settings.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| microhardcorp | ipn4g_firmware | 1.1.0:build1098 |
| microhardcorp | ipn3gb_firmware | 2.2.0:build2160 |
| microhardcorp | ipn4gb_firmware | 1.1.6:build1184-14 |
| microhardcorp | ipn4gb_firmware | 1.1.0:rev2_build1090-2 |
| microhardcorp | ipn4gb_firmware | 1.1.0:rev2_build1086 |
| microhardcorp | bullet-3g_firmware | 1.2.0:reva_build1032 |
| microhardcorp | vip4gb_firmware | 1.1.6:build_1204 |
| microhardcorp | vip4gb_firmware | 1.1.6:rev3_build1184-14 |
| microhardcorp | vip4gb_wifi-n_firmware | 1.1.6:rev2_build1196 |
| microhardcorp | bullet-3g_firmware | 1.2.0:build1076 |
| microhardcorp | bullet-lte_firmware | 1.2.0:build1078 |
| microhardcorp | ipn3gii_firmware | 1.2.0:build1076 |
| microhardcorp | ipn4gii_firmware | 1.2.0:build1078 |
| microhardcorp | bulletplus_firmware | 1.3.0:build1036 |
| microhardcorp | dragon-lte_firmware | 1.1.0:build1036 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration