First published: Tue Oct 19 2021(Updated: )
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to stored cross-scripting, which may allow an attacker to hijack sessions of users connected to the system.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
InHand Networks IR615 Router | ||
Inhand Networks IR615 Firmware | =2.3.0.r4724 | |
Inhand Networks IR615 Firmware | ||
Inhand Networks IR615 Firmware | =2.3.0.r4870 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38468 is considered a moderate severity vulnerability due to the potential for session hijacking.
To fix CVE-2021-38468, upgrade the InHand Networks IR615 Router to versions later than 2.3.0.r4870.
CVE-2021-38468 can facilitate stored cross-site scripting attacks that may enable session hijacking.
IR615 Router versions 2.3.0.r4724 and 2.3.0.r4870 are affected by CVE-2021-38468.
Users of InHand Networks IR615 Routers running the vulnerable firmware versions are at risk due to CVE-2021-38468.