Microhard Systems IPn4G 1.1.0 contains a configuration file disclosure vulnerability that allows authenticated attackers to download sensitive system configuration files. Attackers can retrieve configuration files from multiple directories including '/www', '/etc/m_cli/', and '/tmp' to access system passwords and network settings.
Metrics
Affected Vendors & Products
References
History
Wed, 24 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Microhard Systems IPn4G 1.1.0 contains a configuration file disclosure vulnerability that allows authenticated attackers to download sensitive system configuration files. Attackers can retrieve configuration files from multiple directories including '/www', '/etc/m_cli/', and '/tmp' to access system passwords and network settings. | |
| Title | Microhard Systems IPn4G 1.1.0 Configuration Disclosure via Authenticated Download | |
| Weaknesses | CWE-552 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-24T20:25:35.251Z
Reserved: 2025-12-24T14:28:02.435Z
Link: CVE-2018-25145
No data.
Status : Received
Published: 2025-12-24T20:15:48.903
Modified: 2025-12-24T20:15:48.903
Link: CVE-2018-25145
No data.
OpenCVE Enrichment
No data.