// For flags

CVE-2021-38480

InHand Networks IR615 Router

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions on the router’s management portal, such as making configuration changes, changing administrator credentials, and running system commands on the router.

InHand Networks IR615 Router's Versiones 2.3.0.r4724 y 2.3.0.r4870, son vulnerables a un ataque de tipo cross-site request forgery cuando son enviados comandos no autorizados desde un usuario en el que confía la aplicación web. Esto puede permitir a un atacante llevar a cabo acciones de forma remota en el portal de administración del router, como realizar cambios de configuración, cambiar las credenciales de administrador y ejecutar comandos del sistema en el router

*Credits: Haviv Vaizman, Hay Mizrachi, Alik Koldobsky, Ofir Manzur, and Nikolay Sokolik of OTORIO reported these vulnerabilities to CISA.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-08-10 CVE Reserved
  • 2021-10-19 CVE Published
  • 2024-09-17 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (1)
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Inhandnetworks
Search vendor "Inhandnetworks"
Ir615 Firmware
Search vendor "Inhandnetworks" for product "Ir615 Firmware"
2.3.0.r4724
Search vendor "Inhandnetworks" for product "Ir615 Firmware" and version "2.3.0.r4724"
-
Affected
in Inhandnetworks
Search vendor "Inhandnetworks"
Ir615
Search vendor "Inhandnetworks" for product "Ir615"
--
Safe
Inhandnetworks
Search vendor "Inhandnetworks"
Ir615 Firmware
Search vendor "Inhandnetworks" for product "Ir615 Firmware"
2.3.0.r4870
Search vendor "Inhandnetworks" for product "Ir615 Firmware" and version "2.3.0.r4870"
-
Affected
in Inhandnetworks
Search vendor "Inhandnetworks"
Ir615
Search vendor "Inhandnetworks" for product "Ir615"
--
Safe