First published: Thu May 12 2022(Updated: )
A hard-coded password vulnerability exists in the console infactory functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted network request can lead to privileged operation execution. An attacker can send a sequence of requests to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Inhandnetworks Inrouter302 Firmware | <=3.5.37 | |
Inhand Networks Ir302 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27172 is rated as high severity due to the risk of unauthorized privileged operation execution.
To mitigate CVE-2022-27172, update the InRouter302 firmware to a version higher than 3.5.37.
CVE-2022-27172 affects the InHand Networks InRouter302 with firmware versions up to and including 3.5.37.
CVE-2022-27172 allows an attacker to execute privileged operations through specially-crafted network requests.
Detection of CVE-2022-27172 can be done by monitoring network traffic for unauthorized requests targeting the InRouter302 console.