Description


InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions on the router’s management portal, such as making configuration changes, changing administrator credentials, and running system commands on the router.

Related CPE's


o

inhandnetworks

ir615_firmware

2

h

inhandnetworks

ir615

2

References


https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05

Third Party AdvisoryUS Government Resource

Weaknesses



CWE-352

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 · High

  • CVSS V3.1

  • CVSS V3.0

  • CVSS V2.0

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2021-10-19T13:15:11.347

3 years ago

Last modified

2021-10-22T16:18:22.277

3 years ago