CVE-2018-25148
Published: 24 December 2025
Description
Microhard Systems IPn4G 1.1.0 contains multiple authenticated remote code execution vulnerabilities in the admin interface that allow attackers to create crontab jobs and modify system startup scripts. Attackers can exploit hidden admin features to execute arbitrary commands with root privileges,…
more
including starting services, disabling firewalls, and writing files to the system.
Mitigating Controls (NIST 800-53 r5)AI
Directly counters CWE-266 incorrect privilege assignment by ensuring low-privilege authenticated users cannot execute root-level commands via admin interface flaws.
Remediates the specific authenticated RCE vulnerabilities by applying vendor patches or updates to eliminate crontab, startup script, and hidden feature exploits.
Limits the admin interface to least functionality, preventing exposure of unnecessary features that enable arbitrary command execution with root privileges.
Security SummaryAI
CVE-2018-25148 is a set of multiple authenticated remote code execution vulnerabilities in the admin interface of Microhard Systems IPn4G version 1.1.0. These flaws enable attackers to create crontab jobs, modify system startup scripts, and leverage hidden admin features to execute arbitrary commands with root privileges. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-266 (Incorrect Privilege Assignment).
Attackers with low-privilege authenticated access to the admin interface can exploit these issues remotely over the network with low attack complexity and no user interaction required. Successful exploitation provides root-level access, allowing adversaries to start services, disable firewalls, write files to the system, and perform other arbitrary command execution, resulting in high impacts to confidentiality, integrity, and availability.
Advisories from Zero Science Labs (ZSL-2018-5479) detail the vulnerabilities, and a public proof-of-concept exploit is available on Exploit-DB (45038). The Microhard Systems website (microhardcorp.com) is referenced for potential additional vendor guidance.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables privilege escalation from low-priv to root (T1068), creation of crontab jobs (T1053.003), modification of system startup scripts like RC scripts (T1037.004), and arbitrary Unix shell command execution (T1059.004).