InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions on the router’s management portal, such as making configuration changes, changing administrator credentials, and running system commands on the router.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 06:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 9.6 |
Information
Published : 2021-10-19 13:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38480
Mitre link : CVE-2021-38480
CVE.ORG link : CVE-2021-38480
JSON object : View
Products Affected
inhandnetworks
- ir615_firmware
- ir615
CWE
CWE-352
Cross-Site Request Forgery (CSRF)