InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-24936 InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

InHand Networks has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of this affected product are invited to contact InHand Networks customer support.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-16T23:05:39.987Z

Reserved: 2021-08-10T00:00:00

Link: CVE-2021-38484

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-19T13:15:11.457

Modified: 2024-11-21T06:17:13.047

Link: CVE-2021-38484

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.