First published: Thu Oct 07 2021(Updated: )
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 cloud portal allows for self-registration of the affected product without any requirements to create an account, which may allow an attacker to have full control over the product and execute code within the internal network to which the product is connected.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
InHand Networks IR615 Router | ||
Inhand Networks IR615 Firmware | =2.3.0.r4724 | |
Inhand Networks IR615 Firmware | ||
Inhand Networks IR615 Firmware | =2.3.0.r4870 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38486 is rated as a high severity vulnerability due to the potential for attackers to gain full control over vulnerable devices.
To fix CVE-2021-38486, update the InHand Networks IR615 Router firmware to versions 2.3.0.r5418 or later.
CVE-2021-38486 affects InHand Networks IR615 Router firmware versions 2.3.0.r4724 and 2.3.0.r4870.
The potential impacts of CVE-2021-38486 include unauthorized access and control of the router, allowing attackers to execute malicious code.
Users of InHand Networks IR615 Router running the vulnerable firmware versions 2.3.0.r4724 and 2.3.0.r4870 are impacted by CVE-2021-38486.