First published: Wed Nov 09 2022(Updated: )
A leftover debug code vulnerability exists in the console verify functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to disabling security features. An attacker can send a sequence of requests to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Inhandnetworks Ir302 Firmware | =3.5.45 | |
Inhandnetworks Ir302 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26023 is a leftover debug code vulnerability that exists in the console verify functionality of InHand Networks InRouter302 V3.5.45.
The severity of CVE-2022-26023 is medium (6.5).
CVE-2022-26023 affects Inhandnetworks Ir302 Firmware version 3.5.45.
An attacker can exploit CVE-2022-26023 by sending a specially-crafted series of network requests to disable security features.
Yes, the following references are available: [Link 1](https://inhandnetworks.com/upload/attachment/202210/25/InHand-PSA-2022-02.pdf), [Link 2](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1520).