CVE-2021-38468
- EPSS 0.14%
- Veröffentlicht 19.10.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:17:10
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to stored cross-scripting, which may allow an attacker to hijack sessions of users connected to the system.
CVE-2021-38470
- EPSS 0.37%
- Veröffentlicht 19.10.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:17:10
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a ping tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.
CVE-2021-38472
- EPSS 0.15%
- Veröffentlicht 19.10.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:17:11
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 management portal does not contain an X-FRAME-OPTIONS header, which an attacker may take advantage of by sending a link to an administrator that frames the router’s management portal...
CVE-2021-38474
- EPSS 0.16%
- Veröffentlicht 19.10.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:17:11
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have has no account lockout policy configured for the login page of the product. This may allow an attacker to execute a brute-force password attack with no time limitation and witho...
CVE-2021-38476
- EPSS 0.15%
- Veröffentlicht 19.10.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:17:11
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 authentication process response indicates and validates the existence of a username. This may allow an attacker to enumerate different user accounts.
CVE-2021-38478
- EPSS 0.37%
- Veröffentlicht 19.10.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:17:12
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a traceroute tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.
CVE-2021-38480
- EPSS 0.09%
- Veröffentlicht 19.10.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:17:12
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions o...
CVE-2021-38482
- EPSS 0.14%
- Veröffentlicht 19.10.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:17:12
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 website used to control the router is vulnerable to stored cross-site scripting, which may allow an attacker to hijack sessions of users connected to the system.
- EPSS 0.65%
- Veröffentlicht 19.10.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:17:13
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious ...
CVE-2021-38486
- EPSS 0.25%
- Veröffentlicht 19.10.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:17:13
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 cloud portal allows for self-registration of the affected product without any requirements to create an account, which may allow an attacker to have full control over the product and...