Description
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
Related CPE's
o
inhandnetworks
ir615_firmware
2
h
inhandnetworks
ir615
2
References
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05
Third Party AdvisoryUS Government Resource
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2021-10-19T13:15:11.457
3 years agoLast modified
2021-10-22T15:26:38.713
3 years ago