CVE-2025-35004
Analyzed Analyzed - Analysis Complete
BaseFortify

Publication date: 2025-06-08

Last updated on: 2026-01-12

Assigner: Austin Hackers Anonymous

Description
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88,Β "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-08
Last Modified
2026-01-12
Generated
2026-05-07
AI Q&A
2025-06-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
microhardcorp ipn4gii-na2_firmware to 1.2.0-r1132 (inc)
microhardcorp ipn4gii-na2 *
microhardcorp bulletlte-na2_firmware to 1.2.0-r1132 (inc)
microhardcorp bulletlte-na2 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-88 The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects products using the Microhard BulletLTE-NA2 and IPn4Gii-NA2. It is a post-authentication command injection issue in the AT+MFIP command, which allows an attacker with some level of access to inject malicious commands. This can lead to privilege escalation, meaning the attacker can gain higher-level control than intended. It is classified as CWE-88, which involves improper neutralization of argument delimiters in commands, also known as argument injection.


How can this vulnerability impact me? :

The vulnerability can allow an attacker who has some level of access to the device to escalate their privileges, potentially gaining high-level control over the affected system. This can lead to unauthorized actions, compromise of confidentiality and integrity of data, and disruption of normal operations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart