9.8

CVE-2018-25144

Exploit
Microhard Systems IPn4G 1.1.0 contains an authentication bypass vulnerability in the hidden system-editor.sh script that allows authenticated attackers to read, modify, or delete arbitrary files. Attackers can exploit unsanitized 'path', 'savefile', 'edit', and 'delfile' parameters to perform unauthorized file system modifications through GET and POST requests.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MicrohardcorpIpn4g Firmware Version1.1.0 Updatebuild1098
   MicrohardcorpIpn4g Version-
MicrohardcorpIpn3gb Firmware Version2.2.0 Updatebuild2160
   MicrohardcorpIpn3gb Version-
MicrohardcorpIpn4gb Firmware Version1.1.6 Updatebuild1184-14
   MicrohardcorpIpn4gb Version-
MicrohardcorpIpn4gb Firmware Version1.1.0 Updaterev2_build1090-2
   MicrohardcorpIpn4gb Version-
MicrohardcorpIpn4gb Firmware Version1.1.0 Updaterev2_build1086
   MicrohardcorpIpn4gb Version-
MicrohardcorpBullet-3g Firmware Version1.2.0 Updatereva_build1032
   MicrohardcorpBullet-3g Version-
MicrohardcorpVip4gb Firmware Version1.1.6 Updatebuild_1204
   MicrohardcorpVip4gb Version-
MicrohardcorpVip4gb Firmware Version1.1.6 Updaterev3_build1184-14
   MicrohardcorpVip4gb Version-
MicrohardcorpVip4gb Wifi-n Firmware Version1.1.6 Updaterev2_build1196
   MicrohardcorpVip4gb Wifi-n Version-
MicrohardcorpBullet-3g Firmware Version1.2.0 Updatebuild1076
   MicrohardcorpBullet-3g Version-
MicrohardcorpBullet-lte Firmware Version1.2.0 Updatebuild1078
   MicrohardcorpBullet-lte Version-
MicrohardcorpIpn3gii Firmware Version1.2.0 Updatebuild1076
   MicrohardcorpIpn3gii Version-
MicrohardcorpIpn4gii Firmware Version1.2.0 Updatebuild1078
   MicrohardcorpIpn4gii Version-
MicrohardcorpBulletplus Firmware Version1.3.0 Updatebuild1036
   MicrohardcorpBulletplus Version-
MicrohardcorpDragon-lte Firmware Version1.1.0 Updatebuild1036
   MicrohardcorpDragon-lte Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.26% 0.495
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
disclosure@vulncheck.com 8.4 2.5 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
disclosure@vulncheck.com 8.7 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.