Description


InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.

Related CPE's


o

inhandnetworks

ir615_firmware

2

h

inhandnetworks

ir615

2

References


https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05

Third Party AdvisoryUS Government Resource

Weaknesses



CWE-434


CWE-434

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.2 · High

  • CVSS V3.1

  • CVSS V3.0

  • CVSS V2.0

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2021-10-19T13:15:11.457

3 years ago

Last modified

2021-10-22T15:26:38.713

3 years ago