CVE-2018-25145
moderate-risk
Published 2025-12-24
Microhard Systems IPn4G 1.1.0 contains a configuration file disclosure vulnerability that allows authenticated attackers to download sensitive system configuration files. Attackers can retrieve configuration files from multiple directories including '/www', '/etc/m_cli/', and '/tmp' to access system passwords and network settings.
Do I need to act?
-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (15)
Ipn4G Firmware
Ipn3Gb Firmware
Ipn4Gb Firmware
Ipn4Gb Firmware
Ipn4Gb Firmware
Bullet-3G Firmware
Vip4Gb Firmware
Vip4Gb Firmware
Vip4Gb Wifi-N Firmware
Bullet-3G Firmware
Ipn3Gii Firmware
Ipn4Gii Firmware
Bulletplus Firmware
Dragon-Lte Firmware
Affected Vendors
References (4)
42
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
18/34 · Moderate