First published: Tue Oct 19 2021(Updated: )
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not perform sufficient input validation on client requests from the help page. This may allow an attacker to perform a reflected cross-site scripting attack, which could allow an attacker to run code on behalf of the client browser.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
InHand Networks IR615 Router | ||
Inhand Networks IR615 Firmware | =2.3.0.r4724 | |
Inhand Networks IR615 Firmware | ||
Inhand Networks IR615 Firmware | =2.3.0.r4870 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38466 is classified as a medium severity vulnerability due to its potential for reflected cross-site scripting attacks.
To remediate CVE-2021-38466, update the InHand Networks IR615 Router firmware to version 2.3.0.r5418 or later.
CVE-2021-38466 affects InHand Networks IR615 Router versions 2.3.0.r4724 and 2.3.0.r4870.
CVE-2021-38466 is a reflected cross-site scripting vulnerability.
Yes, CVE-2021-38466 may allow an attacker to execute code on behalf of users through the reflected cross-site scripting vulnerability.