Vulnerabilities (CVE)

Filtered by vendor Inhandnetworks Subscribe
Filtered by product Ir615
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-38476 1 Inhandnetworks 2 Ir615, Ir615 Firmware 2021-10-22 5.0 MEDIUM 5.3 MEDIUM
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 authentication process response indicates and validates the existence of a username. This may allow an attacker to enumerate different user accounts.
CVE-2021-38482 1 Inhandnetworks 2 Ir615, Ir615 Firmware 2021-10-22 3.5 LOW 4.8 MEDIUM
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 website used to control the router is vulnerable to stored cross-site scripting, which may allow an attacker to hijack sessions of users connected to the system.
CVE-2021-38468 1 Inhandnetworks 2 Ir615, Ir615 Firmware 2021-10-22 3.5 LOW 4.8 MEDIUM
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to stored cross-scripting, which may allow an attacker to hijack sessions of users connected to the system.
CVE-2021-38466 1 Inhandnetworks 2 Ir615, Ir615 Firmware 2021-10-22 4.3 MEDIUM 6.1 MEDIUM
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not perform sufficient input validation on client requests from the help page. This may allow an attacker to perform a reflected cross-site scripting attack, which could allow an attacker to run code on behalf of the client browser.
CVE-2021-38472 1 Inhandnetworks 2 Ir615, Ir615 Firmware 2021-10-22 4.3 MEDIUM 4.7 MEDIUM
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 management portal does not contain an X-FRAME-OPTIONS header, which an attacker may take advantage of by sending a link to an administrator that frames the router’s management portal and could lure the administrator to perform changes.