8.8

CVE-2018-25143

Exploit
Microhard Systems IPn4G 1.1.0 contains a service vulnerability that allows authenticated users to enable a restricted SSH shell with a default 'msshc' user. Attackers can exploit a custom 'ping' command in the NcFTP environment to escape the restricted shell and execute commands with root privileges.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MicrohardcorpIpn4g Firmware Version1.1.0 Updatebuild1098
   MicrohardcorpIpn4g Version-
MicrohardcorpIpn3gb Firmware Version2.2.0 Updatebuild2160
   MicrohardcorpIpn3gb Version-
MicrohardcorpIpn4gb Firmware Version1.1.6 Updatebuild1184-14
   MicrohardcorpIpn4gb Version-
MicrohardcorpIpn4gb Firmware Version1.1.0 Updaterev2_build1090-2
   MicrohardcorpIpn4gb Version-
MicrohardcorpIpn4gb Firmware Version1.1.0 Updaterev2_build1086
   MicrohardcorpIpn4gb Version-
MicrohardcorpBullet-3g Firmware Version1.2.0 Updatereva_build1032
   MicrohardcorpBullet-3g Version-
MicrohardcorpVip4gb Firmware Version1.1.6 Updatebuild_1204
   MicrohardcorpVip4gb Version-
MicrohardcorpVip4gb Firmware Version1.1.6 Updaterev3_build1184-14
   MicrohardcorpVip4gb Version-
MicrohardcorpVip4gb Wifi-n Firmware Version1.1.6 Updaterev2_build1196
   MicrohardcorpVip4gb Wifi-n Version-
MicrohardcorpBullet-3g Firmware Version1.2.0 Updatebuild1076
   MicrohardcorpBullet-3g Version-
MicrohardcorpBullet-lte Firmware Version1.2.0 Updatebuild1078
   MicrohardcorpBullet-lte Version-
MicrohardcorpIpn3gii Firmware Version1.2.0 Updatebuild1076
   MicrohardcorpIpn3gii Version-
MicrohardcorpIpn4gii Firmware Version1.2.0 Updatebuild1078
   MicrohardcorpIpn4gii Version-
MicrohardcorpBulletplus Firmware Version1.3.0 Updatebuild1036
   MicrohardcorpBulletplus Version-
MicrohardcorpDragon-lte Firmware Version1.1.0 Updatebuild1036
   MicrohardcorpDragon-lte Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.14% 0.335
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
disclosure@vulncheck.com 8.7 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
disclosure@vulncheck.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.