First published: Thu Oct 07 2021(Updated: )
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 website used to control the router is vulnerable to stored cross-site scripting, which may allow an attacker to hijack sessions of users connected to the system.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
InHand Networks IR615 Router | ||
Inhand Networks IR615 Firmware | =2.3.0.r4724 | |
Inhand Networks IR615 Firmware | ||
Inhand Networks IR615 Firmware | =2.3.0.r4870 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38482 has a high severity rating due to its potential to allow attackers to hijack user sessions.
To mitigate CVE-2021-38482, upgrade the firmware of the InHand Networks IR615 Router to versions beyond 2.3.0.r4870.
CVE-2021-38482 affects versions 2.3.0.r4724 and 2.3.0.r4870 of the InHand Networks IR615 Router.
CVE-2021-38482 is classified as a stored cross-site scripting vulnerability.
Users of the InHand Networks IR615 Router running the vulnerable firmware versions may be impacted by CVE-2021-38482.