CVE-2018-25145

moderate-risk
Published 2025-12-24

Microhard Systems IPn4G 1.1.0 contains a configuration file disclosure vulnerability that allows authenticated attackers to download sensitive system configuration files. Attackers can retrieve configuration files from multiple directories including '/www', '/etc/m_cli/', and '/tmp' to access system passwords and network settings.

Do I need to act?

-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10 Medium
NETWORK / LOW complexity

Affected Products (15)

Ipn4G Firmware
Ipn3Gb Firmware
Ipn4Gb Firmware
Ipn4Gb Firmware
Ipn4Gb Firmware
Bullet-3G Firmware
Vip4Gb Firmware
Vip4Gb Firmware
Vip4Gb Wifi-N Firmware
Bullet-3G Firmware
Ipn3Gii Firmware
Ipn4Gii Firmware
Bulletplus Firmware
Dragon-Lte Firmware

Affected Vendors

42
/ 100
moderate-risk
Severity 24/34 · High
Exploitability 0/34 · Minimal
Exposure 18/34 · Moderate