CVE-2025-35004

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands on Microhard BulletLTE-NA2 and IPn4Gii-NA2 devices through improper input validation in the AT+MFIP command. Attackers can escalate privileges and potentially gain full control of affected devices. Organizations using these specific Microhard products are at risk.

💻 Affected Systems

Products:
  • Microhard BulletLTE-NA2
  • Microhard IPn4Gii-NA2
Versions: All versions prior to patch (specific patched version unknown)
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to exploit, but default credentials may be present in some deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attackers to install persistent backdoors, intercept network traffic, pivot to internal networks, or render devices inoperable.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, configuration changes, and potential data exfiltration from connected networks.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring prevent exploitation attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware

Restart Required: Yes

Instructions:

1. Monitor vendor advisory for firmware updates. 2. Download firmware from Microhard support portal. 3. Follow vendor's firmware update procedures. 4. Verify update completion and restart devices.

🔧 Temporary Workarounds

Restrict AT Command Access

all

Limit access to AT command interface to trusted administrative networks only

Change Default Credentials

all

Ensure strong, unique administrative credentials are set on all devices

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from critical networks
  • Enable detailed logging and monitoring for AT command access and unusual administrative activity

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor's patched version when available. Test AT+MFIP command injection if authorized.

Check Version:

ATI (check via serial console or management interface)

Verify Fix Applied:

Verify firmware version matches or exceeds vendor's patched version. Test that AT+MFIP command no longer accepts malicious input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AT command sequences
  • Multiple failed authentication attempts followed by AT+MFIP usage
  • Administrative privilege changes

Network Indicators:

  • AT command traffic from unexpected sources
  • Unusual outbound connections from devices

SIEM Query:

source="microhard_device" AND (command="AT+MFIP" OR command="AT*" AND status="success")

🔗 References

📤 Share & Export