← Back to CVEs
CVE-2021-38484
CRITICAL9.1
Description
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
CVE Details
CVSS v3.1 Score9.1
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published10/19/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
inhandnetworks:ir615inhandnetworks:ir615_firmware
Weaknesses (CWE)
CWE-434CWE-434
References
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05(ics-cert@hq.dhs.gov)
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.