Skip to main content

CVE-2025-35004: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Microhard IPn4Gii / Bullet-LTE Firmware

High
VulnerabilityCVE-2025-35004cvecve-2025-35004cwe-88
Published: Sun Jun 08 2025 (06/08/2025, 21:05:01 UTC)
Source: CVE Database V5
Vendor/Project: Microhard
Product: IPn4Gii / Bullet-LTE Firmware

Description

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.

AI-Powered Analysis

AILast updated: 07/09/2025, 01:28:04 UTC

Technical Analysis

CVE-2025-35004 is a high-severity vulnerability affecting Microhard's IPn4Gii-NA2 and BulletLTE-NA2 devices, specifically in their firmware. The flaw is an instance of CWE-88, which involves improper neutralization of argument delimiters in commands, commonly known as argument injection. The vulnerability resides in the AT+MFIP command interface, which is used for device management and configuration. An authenticated attacker with at least low privileges can exploit this vulnerability by injecting malicious command arguments through the AT+MFIP command, leading to privilege escalation. This means the attacker can gain higher-level access than originally permitted, potentially executing arbitrary commands with elevated privileges. The CVSS 3.1 score of 7.1 reflects a high severity, with the attack vector being local (AV:L), requiring low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The impact on confidentiality and integrity is high, as attackers can manipulate device behavior and potentially access sensitive data or disrupt operations. Availability impact is not directly affected. At the time of publication, no patches or fixes have been released, increasing the risk for organizations using these devices. The vulnerability is particularly concerning because these devices are often deployed in critical communication infrastructures, including industrial, transportation, and remote monitoring systems, where LTE connectivity is essential. Exploitation could lead to unauthorized control over network devices, undermining network security and operational reliability.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for those relying on Microhard IPn4Gii or Bullet-LTE devices for critical communications infrastructure. These devices are commonly used in industrial automation, transportation networks, and remote telemetry systems. Exploitation could allow attackers to escalate privileges and execute unauthorized commands, potentially leading to data breaches, manipulation of network traffic, or disruption of services. This could affect sectors such as energy, manufacturing, logistics, and public transportation, where LTE-based communication devices are integral. Given the local attack vector and requirement for authentication, insider threats or attackers who have gained initial access to the network could leverage this vulnerability to deepen their foothold. The lack of available patches increases the urgency for organizations to implement compensating controls. Additionally, compromised devices could be used as pivot points for lateral movement within networks, increasing the risk of broader compromise. The confidentiality and integrity of sensitive operational data could be severely impacted, leading to regulatory and compliance challenges under frameworks like GDPR and NIS Directive.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Microhard IPn4Gii and Bullet-LTE devices within dedicated network segments with strict access controls to limit exposure. 2. Restrict access to management interfaces: Ensure that only authorized personnel can access the AT command interface, preferably through secure channels such as VPNs or jump hosts with multi-factor authentication. 3. Monitor and log all AT command usage: Implement detailed logging and real-time monitoring to detect anomalous or unauthorized command injection attempts. 4. Employ strict authentication and authorization policies: Even though the vulnerability requires low privileges, enforcing strong authentication mechanisms can reduce risk. 5. Disable or restrict the use of the AT+MFIP command if not required for operational purposes. 6. Engage with Microhard for updates: Maintain close contact with the vendor to obtain patches or firmware updates as soon as they become available. 7. Conduct regular vulnerability assessments and penetration testing focused on these devices to identify exploitation attempts. 8. Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns targeting these devices. 9. Prepare incident response plans specific to device compromise scenarios to minimize impact in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AHA
Date Reserved
2025-04-15T20:40:30.571Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6845fd8e71f4d251b567fadc

Added to database: 6/8/2025, 9:15:58 PM

Last enriched: 7/9/2025, 1:28:04 AM

Last updated: 9/20/2025, 9:05:32 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats