CVE-2025-35004: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Microhard IPn4Gii / Bullet-LTE Firmware
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
AI Analysis
Technical Summary
CVE-2025-35004 is a high-severity vulnerability affecting Microhard's IPn4Gii-NA2 and BulletLTE-NA2 devices, specifically in their firmware. The flaw is an instance of CWE-88, which involves improper neutralization of argument delimiters in commands, commonly known as argument injection. The vulnerability resides in the AT+MFIP command interface, which is used for device management and configuration. An authenticated attacker with at least low privileges can exploit this vulnerability by injecting malicious command arguments through the AT+MFIP command, leading to privilege escalation. This means the attacker can gain higher-level access than originally permitted, potentially executing arbitrary commands with elevated privileges. The CVSS 3.1 score of 7.1 reflects a high severity, with the attack vector being local (AV:L), requiring low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The impact on confidentiality and integrity is high, as attackers can manipulate device behavior and potentially access sensitive data or disrupt operations. Availability impact is not directly affected. At the time of publication, no patches or fixes have been released, increasing the risk for organizations using these devices. The vulnerability is particularly concerning because these devices are often deployed in critical communication infrastructures, including industrial, transportation, and remote monitoring systems, where LTE connectivity is essential. Exploitation could lead to unauthorized control over network devices, undermining network security and operational reliability.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for those relying on Microhard IPn4Gii or Bullet-LTE devices for critical communications infrastructure. These devices are commonly used in industrial automation, transportation networks, and remote telemetry systems. Exploitation could allow attackers to escalate privileges and execute unauthorized commands, potentially leading to data breaches, manipulation of network traffic, or disruption of services. This could affect sectors such as energy, manufacturing, logistics, and public transportation, where LTE-based communication devices are integral. Given the local attack vector and requirement for authentication, insider threats or attackers who have gained initial access to the network could leverage this vulnerability to deepen their foothold. The lack of available patches increases the urgency for organizations to implement compensating controls. Additionally, compromised devices could be used as pivot points for lateral movement within networks, increasing the risk of broader compromise. The confidentiality and integrity of sensitive operational data could be severely impacted, leading to regulatory and compliance challenges under frameworks like GDPR and NIS Directive.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Microhard IPn4Gii and Bullet-LTE devices within dedicated network segments with strict access controls to limit exposure. 2. Restrict access to management interfaces: Ensure that only authorized personnel can access the AT command interface, preferably through secure channels such as VPNs or jump hosts with multi-factor authentication. 3. Monitor and log all AT command usage: Implement detailed logging and real-time monitoring to detect anomalous or unauthorized command injection attempts. 4. Employ strict authentication and authorization policies: Even though the vulnerability requires low privileges, enforcing strong authentication mechanisms can reduce risk. 5. Disable or restrict the use of the AT+MFIP command if not required for operational purposes. 6. Engage with Microhard for updates: Maintain close contact with the vendor to obtain patches or firmware updates as soon as they become available. 7. Conduct regular vulnerability assessments and penetration testing focused on these devices to identify exploitation attempts. 8. Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns targeting these devices. 9. Prepare incident response plans specific to device compromise scenarios to minimize impact in case of exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-35004: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Microhard IPn4Gii / Bullet-LTE Firmware
Description
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
AI-Powered Analysis
Technical Analysis
CVE-2025-35004 is a high-severity vulnerability affecting Microhard's IPn4Gii-NA2 and BulletLTE-NA2 devices, specifically in their firmware. The flaw is an instance of CWE-88, which involves improper neutralization of argument delimiters in commands, commonly known as argument injection. The vulnerability resides in the AT+MFIP command interface, which is used for device management and configuration. An authenticated attacker with at least low privileges can exploit this vulnerability by injecting malicious command arguments through the AT+MFIP command, leading to privilege escalation. This means the attacker can gain higher-level access than originally permitted, potentially executing arbitrary commands with elevated privileges. The CVSS 3.1 score of 7.1 reflects a high severity, with the attack vector being local (AV:L), requiring low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The impact on confidentiality and integrity is high, as attackers can manipulate device behavior and potentially access sensitive data or disrupt operations. Availability impact is not directly affected. At the time of publication, no patches or fixes have been released, increasing the risk for organizations using these devices. The vulnerability is particularly concerning because these devices are often deployed in critical communication infrastructures, including industrial, transportation, and remote monitoring systems, where LTE connectivity is essential. Exploitation could lead to unauthorized control over network devices, undermining network security and operational reliability.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for those relying on Microhard IPn4Gii or Bullet-LTE devices for critical communications infrastructure. These devices are commonly used in industrial automation, transportation networks, and remote telemetry systems. Exploitation could allow attackers to escalate privileges and execute unauthorized commands, potentially leading to data breaches, manipulation of network traffic, or disruption of services. This could affect sectors such as energy, manufacturing, logistics, and public transportation, where LTE-based communication devices are integral. Given the local attack vector and requirement for authentication, insider threats or attackers who have gained initial access to the network could leverage this vulnerability to deepen their foothold. The lack of available patches increases the urgency for organizations to implement compensating controls. Additionally, compromised devices could be used as pivot points for lateral movement within networks, increasing the risk of broader compromise. The confidentiality and integrity of sensitive operational data could be severely impacted, leading to regulatory and compliance challenges under frameworks like GDPR and NIS Directive.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Microhard IPn4Gii and Bullet-LTE devices within dedicated network segments with strict access controls to limit exposure. 2. Restrict access to management interfaces: Ensure that only authorized personnel can access the AT command interface, preferably through secure channels such as VPNs or jump hosts with multi-factor authentication. 3. Monitor and log all AT command usage: Implement detailed logging and real-time monitoring to detect anomalous or unauthorized command injection attempts. 4. Employ strict authentication and authorization policies: Even though the vulnerability requires low privileges, enforcing strong authentication mechanisms can reduce risk. 5. Disable or restrict the use of the AT+MFIP command if not required for operational purposes. 6. Engage with Microhard for updates: Maintain close contact with the vendor to obtain patches or firmware updates as soon as they become available. 7. Conduct regular vulnerability assessments and penetration testing focused on these devices to identify exploitation attempts. 8. Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns targeting these devices. 9. Prepare incident response plans specific to device compromise scenarios to minimize impact in case of exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AHA
- Date Reserved
- 2025-04-15T20:40:30.571Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6845fd8e71f4d251b567fadc
Added to database: 6/8/2025, 9:15:58 PM
Last enriched: 7/9/2025, 1:28:04 AM
Last updated: 9/20/2025, 9:05:32 AM
Views: 19
Related Threats
CVE-2025-55847: n/a
CriticalCVE-2025-45994: n/a
MediumCVE-2025-60164: CWE-352 Cross-Site Request Forgery (CSRF) in NewsMAN NewsmanApp
HighCVE-2025-59844: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in SonarSource sonarqube-scan-action
HighCVE-2025-11029: Cross-Site Request Forgery in givanz Vvveb
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.