Description
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a traceroute tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.
No analysis available yet.
Remediation
Vendor Workaround
InHand Networks has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of this affected product are invited to contact InHand Networks customer support.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-24930 | InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a traceroute tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device. |
References
| Link | Providers |
|---|---|
| https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 |
|
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-17T03:47:35.024Z
Reserved: 2021-08-10T00:00:00.000Z
Link: CVE-2021-38478
No data.
Status : Modified
Published: 2021-10-19T13:15:11.293
Modified: 2024-11-21T06:17:12.120
Link: CVE-2021-38478
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD