Microhard Systems IPn4G 1.1.0 contains a service vulnerability that allows authenticated users to enable a restricted SSH shell with a default 'msshc' user. Attackers can exploit a custom 'ping' command in the NcFTP environment to escape the restricted shell and execute commands with root privileges.
Metrics
Affected Vendors & Products
References
History
Mon, 05 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microhardcorp
Microhardcorp ipn4g |
|
| Vendors & Products |
Microhardcorp
Microhardcorp ipn4g |
Wed, 24 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 24 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Microhard Systems IPn4G 1.1.0 contains a service vulnerability that allows authenticated users to enable a restricted SSH shell with a default 'msshc' user. Attackers can exploit a custom 'ping' command in the NcFTP environment to escape the restricted shell and execute commands with root privileges. | |
| Title | Microhard Systems IPn4G 1.1.0 Backdoor Jailbreak via Microhard Sh Service | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-24T19:27:48.742Z
Updated: 2025-12-24T20:25:48.441Z
Reserved: 2025-12-24T14:28:02.435Z
Link: CVE-2018-25143
Updated: 2025-12-24T20:12:06.697Z
Status : Awaiting Analysis
Published: 2025-12-24T20:15:48.590
Modified: 2025-12-29T15:58:13.147
Link: CVE-2018-25143
No data.