CVE-2018-25145

EUVD-2025-205333
Microhard Systems IPn4G 1.1.0 contains a configuration file disclosure vulnerability that allows authenticated attackers to download sensitive system configuration files. Attackers can retrieve configuration files from multiple directories including '/www', '/etc/m_cli/', and '/tmp' to access system passwords and network settings.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
VulnCheckCNA
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 11%
Affected Products (NVD)
VendorProductVersion
microhardcorpipn4g_firmware
1.1.0:build1098
microhardcorpipn3gb_firmware
2.2.0:build2160
microhardcorpipn4gb_firmware
1.1.6:build1184-14
microhardcorpipn4gb_firmware
1.1.0:rev2_build1090-2
microhardcorpipn4gb_firmware
1.1.0:rev2_build1086
microhardcorpbullet-3g_firmware
1.2.0:reva_build1032
microhardcorpvip4gb_firmware
1.1.6:build_1204
microhardcorpvip4gb_firmware
1.1.6:rev3_build1184-14
microhardcorpvip4gb_wifi-n_firmware
1.1.6:rev2_build1196
microhardcorpbullet-3g_firmware
1.2.0:build1076
microhardcorpbullet-lte_firmware
1.2.0:build1078
microhardcorpipn3gii_firmware
1.2.0:build1076
microhardcorpipn4gii_firmware
1.2.0:build1078
microhardcorpbulletplus_firmware
1.3.0:build1036
microhardcorpdragon-lte_firmware
1.1.0:build1036
𝑥
= Vulnerable software versions