Description
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions on the router’s management portal, such as making configuration changes, changing administrator credentials, and running system commands on the router.
Related CPE's
o
inhandnetworks
ir615_firmware
h
inhandnetworks
ir615
References
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.6 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2021-10-19T11:15:11.347Z
4 years agoLast modified
2024-11-21T05:17:12.397Z
1 year ago