Microhard Systems IPn4G 1.1.0 contains a configuration file disclosure vulnerability that allows authenticated attackers to download sensitive system configuration files. Attackers can retrieve configuration files from multiple directories including '/www', '/etc/m_cli/', and '/tmp' to access system passwords and network settings.
Metrics
Affected Vendors & Products
References
History
Mon, 05 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microhardcorp
Microhardcorp ipn4g |
|
| Vendors & Products |
Microhardcorp
Microhardcorp ipn4g |
Wed, 24 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 24 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Microhard Systems IPn4G 1.1.0 contains a configuration file disclosure vulnerability that allows authenticated attackers to download sensitive system configuration files. Attackers can retrieve configuration files from multiple directories including '/www', '/etc/m_cli/', and '/tmp' to access system passwords and network settings. | |
| Title | Microhard Systems IPn4G 1.1.0 Configuration Disclosure via Authenticated Download | |
| Weaknesses | CWE-552 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-24T19:27:49.597Z
Updated: 2025-12-24T20:25:35.251Z
Reserved: 2025-12-24T14:28:02.435Z
Link: CVE-2018-25145
Updated: 2025-12-24T20:11:46.121Z
Status : Awaiting Analysis
Published: 2025-12-24T20:15:48.903
Modified: 2025-12-29T15:58:13.147
Link: CVE-2018-25145
No data.