Vulnerability Description
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Inhandnetworks | Ir615 Firmware | 2.3.0.r4724 |
| Inhandnetworks | Ir615 | - |
Related Weaknesses (CWE)
References
- https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05Third Party AdvisoryUS Government Resource
- https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2021-38484?
CVE-2021-38484 is a vulnerability with a CVSS score of 9.1 (CRITICAL). InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker...
How severe is CVE-2021-38484?
CVE-2021-38484 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-38484?
Check the references section above for vendor advisories and patch information. Affected products include: Inhandnetworks Ir615 Firmware, Inhandnetworks Ir615.