CVE-2021-38484

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4724:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:ir615:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4870:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:ir615:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:17

Type Values Removed Values Added
References () https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 - Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 - Third Party Advisory, US Government Resource
CVSS v2 : 9.0
v3 : 7.2
v2 : 9.0
v3 : 9.1

Information

Published : 2021-10-19 13:15

Updated : 2024-11-21 06:17


NVD link : CVE-2021-38484

Mitre link : CVE-2021-38484

CVE.ORG link : CVE-2021-38484


JSON object : View

Products Affected

inhandnetworks

  • ir615_firmware
  • ir615
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type