Description
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
Related CPE's
o
inhandnetworks
ir615_firmware
2
h
inhandnetworks
ir615
2
References
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05
Third Party AdvisoryUS Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05
Third Party AdvisoryUS Government Resource
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9.1 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2021-10-19T11:15:11.457Z
4 years agoLast modified
2024-11-21T05:17:13.047Z
1 year ago