vendor:
IPn4G, IPn3Gb, Bullet-3G, VIP4Gb, VIP4G, VIP4G-WiFi-N, IPn3Gii, IPn4Gii, BulletPlus, and Dragon-LTE
by:
Security Affairs
9.8
CVSS
CRITICAL
Default Credentials
522
CWE
Product Name: IPn4G, IPn3Gb, Bullet-3G, VIP4Gb, VIP4G, VIP4G-WiFi-N, IPn3Gii, IPn4Gii, BulletPlus, and Dragon-LTE
Affected Version From: IPn4G 1.1.0 build 1098
Affected Version To: Dragon-LTE 1.1.0 build 1036
Patch Exists: YES
Related CWE: CVE-2020-14092
CPE: h:microhard_systems:ipn4g
Metasploit:
N/A
Platforms Tested: None
2020
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Default Credentials
Microhard Systems Inc. IPn4G, IPn3Gb, Bullet-3G, VIP4Gb, VIP4G, VIP4G-WiFi-N, IPn3Gii, IPn4Gii, BulletPlus, and Dragon-LTE devices have a default password of 'microhard' for the root user. An attacker can use this password to gain access to the device and modify its settings.
Mitigation:
Change the default password of the root user.