InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 cloud portal allows for self-registration of the affected product without any requirements to create an account, which may allow an attacker to have full control over the product and execute code within the internal network to which the product is connected.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 06:17
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.0
v3 : 8.0 |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 - Third Party Advisory, US Government Resource |
Information
Published : 2021-10-19 13:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38486
Mitre link : CVE-2021-38486
CVE.ORG link : CVE-2021-38486
JSON object : View
Products Affected
inhandnetworks
- ir615_firmware
- ir615