Microhard Systems IPn4G 1.1.0 contains a configuration file disclosure vulnerability that allows authenticated attackers to download sensitive system configuration files. Attackers can retrieve configuration files from multiple directories including '/www', '/etc/m_cli/', and '/tmp' to access system passwords and network settings.
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.1.0-build1098"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.2.0-build2160"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.1.6-build1184\\-14"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.1.0-rev2_build1090\\-2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.1.0-rev2_build1086"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.2.0-reva_build1032"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.1.6-build_1204"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.1.6-rev3_build1184\\-14"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.1.6-rev2_build1196"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.2.0-build1076"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.2.0-build1078"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.2.0-build1076"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.2.0-build1078"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.3.0-build1036"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.1.0-build1036"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-25145.json"