CVE-2025-35010

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands on Microhard BulletLTE-NA2 and IPn4Gii-NA2 devices through improper input validation in the AT+MNPINGTM command. Attackers can escalate privileges and potentially gain full control of affected devices. Organizations using these specific Microhard cellular routers are at risk.

💻 Affected Systems

Products:
  • Microhard BulletLTE-NA2
  • Microhard IPn4Gii-NA2
Versions: All versions prior to patch
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to exploit, but default credentials may be used if not changed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to reconfigure network settings, intercept traffic, establish persistence, and pivot to internal networks.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, configuration changes, and potential data interception.

🟢

If Mitigated

Limited impact if devices are properly segmented, have strong authentication, and command injection attempts are blocked.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware

Restart Required: Yes

Instructions:

1. Monitor vendor advisory for patch release. 2. Download firmware update from Microhard support portal. 3. Apply update following vendor instructions. 4. Reboot device.

🔧 Temporary Workarounds

Restrict AT command access

all

Limit access to AT command interface to trusted management networks only

Change default credentials

all

Ensure strong, unique passwords are set for all administrative accounts

🧯 If You Can't Patch

  • Network segmentation: Isolate affected devices in separate VLANs with strict firewall rules
  • Monitor for suspicious AT command usage and authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check if device responds to AT+MNPINGTM command with improper input validation

Check Version:

ATI (check firmware version via serial/console)

Verify Fix Applied:

Test if command injection attempts are properly sanitized after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual AT command sequences
  • Multiple failed authentication attempts followed by AT+MNPINGTM usage
  • Privilege escalation attempts

Network Indicators:

  • Unexpected serial/console traffic to devices
  • AT command usage from unauthorized sources

SIEM Query:

source="device_logs" AND (command="AT+MNPINGTM" OR command="AT+" AND contains(arguments, ";"))

🔗 References

📤 Share & Export