CVE-2025-35005: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Microhard IPn4Gii / Bullet-LTE Firmware
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
AI Analysis
Technical Summary
CVE-2025-35005 is a high-severity vulnerability affecting Microhard's IPn4Gii-NA2 and BulletLTE-NA2 firmware products. The flaw is categorized under CWE-88, which involves improper neutralization of argument delimiters in commands, commonly referred to as argument injection. Specifically, this vulnerability resides in the handling of the AT+MFMAC command, which is used for device management or configuration. An authenticated attacker with low privileges can exploit this command injection flaw to escalate their privileges on the device. The vulnerability allows injection of malicious arguments into the command, leading to unauthorized execution of commands with elevated privileges. The CVSS 3.1 score is 7.1, reflecting high impact on confidentiality and integrity, with no impact on availability. The attack vector is local (AV:L), requiring the attacker to have some level of access (PR:L) but no user interaction (UI:N). The vulnerability is unpatched as of the initial disclosure date (June 8, 2025), and no known exploits have been reported in the wild yet. Given the nature of the devices—industrial-grade LTE routers and modems used for critical communications in remote or industrial environments—this vulnerability poses a significant risk if exploited, potentially allowing attackers to manipulate device configurations, intercept or alter network traffic, or pivot into internal networks.
Potential Impact
For European organizations, particularly those in sectors relying on industrial IoT, critical infrastructure, or remote communications (such as utilities, transportation, manufacturing, and energy), this vulnerability could have serious consequences. Exploitation could lead to unauthorized access to sensitive network segments, data exfiltration, or disruption of communications. The ability to escalate privileges on these devices could enable attackers to bypass security controls, manipulate network traffic, or deploy further attacks within the organization's network. Given the increasing adoption of LTE-based industrial communication devices in Europe, the risk extends to operational technology environments where availability and integrity of communications are critical. The lack of a patch increases exposure, and the post-authentication requirement means insider threats or compromised credentials could facilitate exploitation. The confidentiality and integrity impacts are high, potentially leading to data breaches or sabotage of industrial processes.
Mitigation Recommendations
Organizations should immediately inventory their use of Microhard IPn4Gii-NA2 and BulletLTE-NA2 devices to identify affected firmware versions. Until a patch is available, strict access controls must be enforced to limit who can authenticate to these devices, including strong credential management and multi-factor authentication where possible. Network segmentation should isolate these devices from general IT networks and limit management access to trusted administrators only. Monitoring and logging of AT command usage should be enabled to detect anomalous or unauthorized command executions. If feasible, disable or restrict the use of the AT+MFMAC command or any remote management interfaces that allow command injection. Additionally, organizations should engage with Microhard or their vendors for updates on patch availability and apply firmware updates promptly once released. Incident response plans should be updated to include detection and mitigation strategies for exploitation attempts of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-35005: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Microhard IPn4Gii / Bullet-LTE Firmware
Description
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
AI-Powered Analysis
Technical Analysis
CVE-2025-35005 is a high-severity vulnerability affecting Microhard's IPn4Gii-NA2 and BulletLTE-NA2 firmware products. The flaw is categorized under CWE-88, which involves improper neutralization of argument delimiters in commands, commonly referred to as argument injection. Specifically, this vulnerability resides in the handling of the AT+MFMAC command, which is used for device management or configuration. An authenticated attacker with low privileges can exploit this command injection flaw to escalate their privileges on the device. The vulnerability allows injection of malicious arguments into the command, leading to unauthorized execution of commands with elevated privileges. The CVSS 3.1 score is 7.1, reflecting high impact on confidentiality and integrity, with no impact on availability. The attack vector is local (AV:L), requiring the attacker to have some level of access (PR:L) but no user interaction (UI:N). The vulnerability is unpatched as of the initial disclosure date (June 8, 2025), and no known exploits have been reported in the wild yet. Given the nature of the devices—industrial-grade LTE routers and modems used for critical communications in remote or industrial environments—this vulnerability poses a significant risk if exploited, potentially allowing attackers to manipulate device configurations, intercept or alter network traffic, or pivot into internal networks.
Potential Impact
For European organizations, particularly those in sectors relying on industrial IoT, critical infrastructure, or remote communications (such as utilities, transportation, manufacturing, and energy), this vulnerability could have serious consequences. Exploitation could lead to unauthorized access to sensitive network segments, data exfiltration, or disruption of communications. The ability to escalate privileges on these devices could enable attackers to bypass security controls, manipulate network traffic, or deploy further attacks within the organization's network. Given the increasing adoption of LTE-based industrial communication devices in Europe, the risk extends to operational technology environments where availability and integrity of communications are critical. The lack of a patch increases exposure, and the post-authentication requirement means insider threats or compromised credentials could facilitate exploitation. The confidentiality and integrity impacts are high, potentially leading to data breaches or sabotage of industrial processes.
Mitigation Recommendations
Organizations should immediately inventory their use of Microhard IPn4Gii-NA2 and BulletLTE-NA2 devices to identify affected firmware versions. Until a patch is available, strict access controls must be enforced to limit who can authenticate to these devices, including strong credential management and multi-factor authentication where possible. Network segmentation should isolate these devices from general IT networks and limit management access to trusted administrators only. Monitoring and logging of AT command usage should be enabled to detect anomalous or unauthorized command executions. If feasible, disable or restrict the use of the AT+MFMAC command or any remote management interfaces that allow command injection. Additionally, organizations should engage with Microhard or their vendors for updates on patch availability and apply firmware updates promptly once released. Incident response plans should be updated to include detection and mitigation strategies for exploitation attempts of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AHA
- Date Reserved
- 2025-04-15T20:40:30.571Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6846c60e7b622a9fdf1e793b
Added to database: 6/9/2025, 11:31:26 AM
Last enriched: 7/9/2025, 11:42:31 AM
Last updated: 11/22/2025, 6:04:54 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.