First published: Tue Oct 19 2021(Updated: )
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Inhandnetworks Ir615 Firmware | =2.3.0.r4724 | |
Inhandnetworks Ir615 | ||
Inhandnetworks Ir615 Firmware | =2.3.0.r4870 | |
InHand Networks IR615 Router: Versions 2.3.0.r5417 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38484 is a vulnerability in the InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 that allows an attacker to upload malicious files.
CVE-2021-38484 has a severity rating of 7.2, which is classified as critical.
CVE-2021-38484 allows an attacker, acting as an administrator, to upload malicious files to the router, which can lead to cross-site scripting and other security issues.
Yes, the InHand Networks IR615 Router version 2.3.0.r4724 is vulnerable to CVE-2021-38484.
At the moment, there is no specific fix available for CVE-2021-38484. It is recommended to update to a secure version if one becomes available or follow the guidance provided by the vendor.