InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 06:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 9.1 |
Information
Published : 2021-10-19 13:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38484
Mitre link : CVE-2021-38484
CVE.ORG link : CVE-2021-38484
JSON object : View
Products Affected
inhandnetworks
- ir615_firmware
- ir615
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type