InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions on the router’s management portal, such as making configuration changes, changing administrator credentials, and running system commands on the router.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-24932 | InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions on the router’s management portal, such as making configuration changes, changing administrator credentials, and running system commands on the router. |
Fixes
Solution
No solution given by the vendor.
Workaround
InHand Networks has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of this affected product are invited to contact InHand Networks customer support.
References
| Link | Providers |
|---|---|
| https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 |
|
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-17T03:13:52.768Z
Reserved: 2021-08-10T00:00:00
Link: CVE-2021-38480
No data.
Status : Modified
Published: 2021-10-19T13:15:11.347
Modified: 2024-11-21T06:17:12.397
Link: CVE-2021-38480
No data.
OpenCVE Enrichment
No data.
EUVD