CVE-2021-38484

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4724:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:ir615:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4870:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:ir615:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-10-19 13:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-38484

Mitre link : CVE-2021-38484

CVE.ORG link : CVE-2021-38484


JSON object : View

Products Affected

inhandnetworks

  • ir615_firmware
  • ir615
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type