First published: Thu Oct 07 2021(Updated: )
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a traceroute tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Inhandnetworks Ir615 Firmware | =2.3.0.r4724 | |
Inhandnetworks Ir615 | ||
Inhandnetworks Ir615 Firmware | =2.3.0.r4870 | |
InHand Networks IR615 Router: Versions 2.3.0.r5417 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38478 has been classified as a critical vulnerability due to the potential for remote command execution.
To mitigate CVE-2021-38478, users should update to versions of the InHand Networks IR615 Router firmware that are newer than 2.3.0.r4870.
CVE-2021-38478 affects InHand Networks IR615 Router firmware versions 2.3.0.r4724 and 2.3.0.r4870.
CVE-2021-38478 can be exploited by attackers using a traceroute tool to inject commands into the device.
Yes, CVE-2021-38478 allows an attacker to remotely execute commands on the device.