Inhandnetworks

Ir615 Firmware

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Veröffentlicht 19.10.2021 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:17:10

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to stored cross-scripting, which may allow an attacker to hijack sessions of users connected to the system.

  • EPSS 0.37%
  • Veröffentlicht 19.10.2021 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:17:10

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a ping tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.

  • EPSS 0.15%
  • Veröffentlicht 19.10.2021 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:17:11

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 management portal does not contain an X-FRAME-OPTIONS header, which an attacker may take advantage of by sending a link to an administrator that frames the router’s management portal...

  • EPSS 0.16%
  • Veröffentlicht 19.10.2021 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:17:11

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have has no account lockout policy configured for the login page of the product. This may allow an attacker to execute a brute-force password attack with no time limitation and witho...

  • EPSS 0.15%
  • Veröffentlicht 19.10.2021 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:17:11

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 authentication process response indicates and validates the existence of a username. This may allow an attacker to enumerate different user accounts.

  • EPSS 0.37%
  • Veröffentlicht 19.10.2021 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:17:12

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a traceroute tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.

  • EPSS 0.09%
  • Veröffentlicht 19.10.2021 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:17:12

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions o...

  • EPSS 0.14%
  • Veröffentlicht 19.10.2021 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:17:12

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 website used to control the router is vulnerable to stored cross-site scripting, which may allow an attacker to hijack sessions of users connected to the system.

  • EPSS 0.65%
  • Veröffentlicht 19.10.2021 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:17:13

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious ...

  • EPSS 0.25%
  • Veröffentlicht 19.10.2021 13:15:11
  • Zuletzt bearbeitet 21.11.2024 06:17:13

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 cloud portal allows for self-registration of the affected product without any requirements to create an account, which may allow an attacker to have full control over the product and...