CVE-2018-25147
Severity CVSS v4.0:
CRITICAL
Type:
Unavailable / Other
Publication date:
24/12/2025
Last modified:
26/01/2026
Description
Microhard Systems IPn4G 1.1.0 contains hardcoded default credentials that cannot be changed through normal gateway operations. Attackers can exploit these default credentials to gain unauthorized root-level access to the device by logging in with predefined username and password combinations.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:microhardcorp:ipn4g_firmware:1.1.0:build1098:*:*:*:*:*:* | ||
| cpe:2.3:h:microhardcorp:ipn4g:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microhardcorp:ipn3gb_firmware:2.2.0:build2160:*:*:*:*:*:* | ||
| cpe:2.3:h:microhardcorp:ipn3gb:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.6:build1184-14:*:*:*:*:*:* | ||
| cpe:2.3:h:microhardcorp:ipn4gb:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.0:rev2_build1090-2:*:*:*:*:*:* | ||
| cpe:2.3:h:microhardcorp:ipn4gb:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microhardcorp:ipn4gb_firmware:1.1.0:rev2_build1086:*:*:*:*:*:* | ||
| cpe:2.3:h:microhardcorp:ipn4gb:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microhardcorp:bullet-3g_firmware:1.2.0:reva_build1032:*:*:*:*:*:* | ||
| cpe:2.3:h:microhardcorp:bullet-3g:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microhardcorp:vip4gb_firmware:1.1.6:build_1204:*:*:*:*:*:* | ||
| cpe:2.3:h:microhardcorp:vip4gb:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microhardcorp:vip4gb_firmware:1.1.6:rev3_build1184-14:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



