First published: Tue Oct 19 2021(Updated: )
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a ping tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Inhandnetworks Ir615 Firmware | =2.3.0.r4724 | |
Inhandnetworks Ir615 | ||
Inhandnetworks Ir615 Firmware | =2.3.0.r4870 | |
InHand Networks IR615 Router: Versions 2.3.0.r5417 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-38470 is critical (9.1).
Versions 2.3.0.r4724 and 2.3.0.r4870 of InHand Networks IR615 Router are affected by CVE-2021-38470.
An attacker can exploit CVE-2021-38470 by using a ping tool to inject commands into the device.
The potential impact of CVE-2021-38470 is that the attacker may be able to remotely run commands on the device.
Yes, it is recommended to update to a patched version of InHand Networks IR615 Router firmware to mitigate CVE-2021-38470.