inhandnetworks CVE Vulnerabilities & Metrics

Focus on inhandnetworks vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About inhandnetworks Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with inhandnetworks. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total inhandnetworks CVEs: 55
Earliest CVE date: 19 Oct 2021, 13:15 UTC
Latest CVE date: 12 Jan 2023, 23:15 UTC

Latest CVE reference: CVE-2023-22601

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical inhandnetworks CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.09

Max CVSS: 9.3

Critical CVEs (≥9): 6

CVSS Range vs. Count

Range Count
0.0-3.9 14
4.0-6.9 25
7.0-8.9 10
9.0-10.0 6

CVSS Distribution Chart

Top 5 Highest CVSS inhandnetworks CVEs

These are the five CVEs with the highest CVSS scores for inhandnetworks, sorted by severity first and recency.

All CVEs for inhandnetworks

CVE-2023-22601 inhandnetworks vulnerability CVSS: 0 12 Jan 2023, 23:15 UTC

InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform.

CVE-2023-22600 inhandnetworks vulnerability CVSS: 0 12 Jan 2023, 23:15 UTC

InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-284: Improper Access Control. They allow unauthenticated devices to subscribe to MQTT topics on the same network as the device manager. An unauthorized user who knows of an existing topic name could send and receive messages to and from that topic. This includes the ability to send GET/SET configuration commands, reboot commands, and push firmware updates.

CVE-2023-22599 inhandnetworks vulnerability CVSS: 0 12 Jan 2023, 23:15 UTC

InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-760: Use of a One-way Hash with a Predictable Salt. They  send MQTT credentials in response to HTTP/HTTPS requests from the cloud platform. These credentials are encoded using a hardcoded string into an MD5 hash. This string could be easily calculated by an unauthorized user who spoofed sending an HTTP/HTTPS request to the devices. This could result in the affected devices being temporarily disconnected from the cloud platform and allow the user to receive MQTT commands with potentially sensitive information.

CVE-2023-22598 inhandnetworks vulnerability CVSS: 0 12 Jan 2023, 23:15 UTC

InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). An unauthorized user with privileged access to the local web interface or the cloud account managing the affected devices could push a specially crafted configuration update file to gain root access. This could lead to remote code execution with root privileges.

CVE-2023-22597 inhandnetworks vulnerability CVSS: 0 12 Jan 2023, 23:15 UTC

InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-319: Cleartext Transmission of Sensitive Information. They use an unsecured channel to communicate with the cloud platform by default. An unauthorized user could intercept this communication and steal sensitive information such as configuration information and MQTT credentials; this could allow MQTT command injection.

CVE-2022-30543 inhandnetworks vulnerability CVSS: 0 09 Nov 2022, 18:15 UTC

A leftover debug code vulnerability exists in the console infct functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to execution of privileged operations. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-29888 inhandnetworks vulnerability CVSS: 0 09 Nov 2022, 18:15 UTC

A leftover debug code vulnerability exists in the httpd port 4444 upload.cgi functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted HTTP request can lead to arbitrary file deletion. An attacker can send an HTTP request to trigger this vulnerability.

CVE-2022-29481 inhandnetworks vulnerability CVSS: 0 09 Nov 2022, 18:15 UTC

A leftover debug code vulnerability exists in the console nvram functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to disabling security features. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-28689 inhandnetworks vulnerability CVSS: 0 09 Nov 2022, 18:15 UTC

A leftover debug code vulnerability exists in the console support functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-26023 inhandnetworks vulnerability CVSS: 0 09 Nov 2022, 18:15 UTC

A leftover debug code vulnerability exists in the console verify functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to disabling security features. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-25932 inhandnetworks vulnerability CVSS: 0 09 Nov 2022, 18:15 UTC

The firmware of InHand Networks InRouter302 V3.5.45 introduces fixes for TALOS-2022-1472 and TALOS-2022-1474. The fixes are incomplete. An attacker can still perform, respectively, a privilege escalation and an information disclosure vulnerability.

CVE-2022-27172 inhandnetworks vulnerability CVSS: 6.5 12 May 2022, 17:15 UTC

A hard-coded password vulnerability exists in the console infactory functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted network request can lead to privileged operation execution. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-26782 inhandnetworks vulnerability CVSS: 6.5 12 May 2022, 17:15 UTC

Multiple improper input validation vulnerabilities exists in the libnvram.so nvram_import functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted file can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.An improper input validation vulnerability exists in the `httpd`'s `user_define_set_item` function. Controlling the `user_define_timeout` nvram variable can lead to remote code execution.

CVE-2022-26781 inhandnetworks vulnerability CVSS: 6.5 12 May 2022, 17:15 UTC

Multiple improper input validation vulnerabilities exists in the libnvram.so nvram_import functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted file can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.An improper input validation vulnerability exists in the `httpd`'s `user_define_print` function. Controlling the `user_define_timeout` nvram variable can lead to remote code execution.

CVE-2022-26780 inhandnetworks vulnerability CVSS: 6.5 12 May 2022, 17:15 UTC

Multiple improper input validation vulnerabilities exists in the libnvram.so nvram_import functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted file can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.An improper input validation vulnerability exists in the `httpd`'s `user_define_init` function. Controlling the `user_define_timeout` nvram variable can lead to remote code execution.

CVE-2022-26518 inhandnetworks vulnerability CVSS: 6.5 12 May 2022, 17:15 UTC

An OS command injection vulnerability exists in the console infactory_net functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-26510 inhandnetworks vulnerability CVSS: 4.0 12 May 2022, 17:15 UTC

A firmware update vulnerability exists in the iburn firmware checks functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted HTTP request can lead to firmware update. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-26420 inhandnetworks vulnerability CVSS: 9.0 12 May 2022, 17:15 UTC

An OS command injection vulnerability exists in the console infactory_port functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-26085 inhandnetworks vulnerability CVSS: 6.5 12 May 2022, 17:15 UTC

An OS command injection vulnerability exists in the httpd wlscan_ASP functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

CVE-2022-26075 inhandnetworks vulnerability CVSS: 9.0 12 May 2022, 17:15 UTC

An OS command injection vulnerability exists in the console infactory_wlan functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-26042 inhandnetworks vulnerability CVSS: 6.5 12 May 2022, 17:15 UTC

An OS command injection vulnerability exists in the daretools binary functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-26020 inhandnetworks vulnerability CVSS: 4.0 12 May 2022, 17:15 UTC

An information disclosure vulnerability exists in the router configuration export functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted network request can lead to increased privileges. An attacker can send an HTTP request to trigger this vulnerability.

CVE-2022-26007 inhandnetworks vulnerability CVSS: 9.0 12 May 2022, 17:15 UTC

An OS command injection vulnerability exists in the console factory functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted network request can lead to command execution. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-26002 inhandnetworks vulnerability CVSS: 6.5 12 May 2022, 17:15 UTC

A stack-based buffer overflow vulnerability exists in the console factory functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted network request can lead to remote code execution. An attacker can send a sequence of malicious packets to trigger this vulnerability.

CVE-2022-25995 inhandnetworks vulnerability CVSS: 9.0 12 May 2022, 17:15 UTC

A command execution vulnerability exists in the console inhand functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-25172 inhandnetworks vulnerability CVSS: 4.3 12 May 2022, 17:15 UTC

An information disclosure vulnerability exists in the web interface session cookie functionality of InHand Networks InRouter302 V3.5.4. The session cookie misses the HttpOnly flag, making it accessible via JavaScript and thus allowing an attacker, able to perform an XSS attack, to steal the session cookie.

CVE-2022-24910 inhandnetworks vulnerability CVSS: 4.6 12 May 2022, 17:15 UTC

A buffer overflow vulnerability exists in the httpd parse_ping_result API functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted file can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.

CVE-2022-21809 inhandnetworks vulnerability CVSS: 5.5 12 May 2022, 17:15 UTC

A file write vulnerability exists in the httpd upload.cgi functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted HTTP request can lead to arbitrary file upload. An attacker can upload a malicious file to trigger this vulnerability.

CVE-2022-21238 inhandnetworks vulnerability CVSS: 4.3 12 May 2022, 17:15 UTC

A cross-site scripting (xss) vulnerability exists in the info.jsp functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can send an HTTP request to trigger this vulnerability.

CVE-2022-21182 inhandnetworks vulnerability CVSS: 6.5 12 May 2022, 17:15 UTC

A privilege escalation vulnerability exists in the router configuration import functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted HTTP request can lead to increased privileges. An attacker can send an HTTP request to trigger this vulnerability.

CVE-2022-27280 inhandnetworks vulnerability CVSS: 3.5 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the web_exec parameter at /apply.cgi.

CVE-2022-27279 inhandnetworks vulnerability CVSS: 5.0 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain an arbitrary file read via the function sub_177E0.

CVE-2022-27277 inhandnetworks vulnerability CVSS: 6.4 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain an arbitrary file deletion vulnerability via the function sub_17C08.

CVE-2022-27276 inhandnetworks vulnerability CVSS: 7.5 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_10F2C. This vulnerability is triggered via a crafted packet.

CVE-2022-27275 inhandnetworks vulnerability CVSS: 7.5 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_122D0. This vulnerability is triggered via a crafted packet.

CVE-2022-27274 inhandnetworks vulnerability CVSS: 7.5 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_12028. This vulnerability is triggered via a crafted packet.

CVE-2022-27273 inhandnetworks vulnerability CVSS: 7.5 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_12168. This vulnerability is triggered via a crafted packet.

CVE-2022-27272 inhandnetworks vulnerability CVSS: 7.5 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_1791C. This vulnerability is triggered via a crafted packet.

CVE-2022-27271 inhandnetworks vulnerability CVSS: 7.5 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the component python-lib. This vulnerability is triggered via a crafted packet.

CVE-2022-27270 inhandnetworks vulnerability CVSS: 7.5 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the component ipsec_secrets. This vulnerability is triggered via a crafted packet.

CVE-2022-27269 inhandnetworks vulnerability CVSS: 7.5 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the component config_ovpn. This vulnerability is triggered via a crafted packet.

CVE-2022-27268 inhandnetworks vulnerability CVSS: 7.5 10 Apr 2022, 21:15 UTC

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the component get_cgi_from_memory. This vulnerability is triggered via a crafted packet.

CVE-2021-38486 inhandnetworks vulnerability CVSS: 6.0 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 cloud portal allows for self-registration of the affected product without any requirements to create an account, which may allow an attacker to have full control over the product and execute code within the internal network to which the product is connected.

CVE-2021-38484 inhandnetworks vulnerability CVSS: 9.0 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.

CVE-2021-38482 inhandnetworks vulnerability CVSS: 3.5 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 website used to control the router is vulnerable to stored cross-site scripting, which may allow an attacker to hijack sessions of users connected to the system.

CVE-2021-38480 inhandnetworks vulnerability CVSS: 9.3 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions on the router’s management portal, such as making configuration changes, changing administrator credentials, and running system commands on the router.

CVE-2021-38478 inhandnetworks vulnerability CVSS: 6.5 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a traceroute tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.

CVE-2021-38476 inhandnetworks vulnerability CVSS: 5.0 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 authentication process response indicates and validates the existence of a username. This may allow an attacker to enumerate different user accounts.

CVE-2021-38474 inhandnetworks vulnerability CVSS: 5.0 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have has no account lockout policy configured for the login page of the product. This may allow an attacker to execute a brute-force password attack with no time limitation and without harming the normal operation of the user. This could allow an attacker to gain valid credentials for the product interface.

CVE-2021-38472 inhandnetworks vulnerability CVSS: 4.3 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 management portal does not contain an X-FRAME-OPTIONS header, which an attacker may take advantage of by sending a link to an administrator that frames the router’s management portal and could lure the administrator to perform changes.

CVE-2021-38470 inhandnetworks vulnerability CVSS: 6.5 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a ping tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.

CVE-2021-38468 inhandnetworks vulnerability CVSS: 3.5 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to stored cross-scripting, which may allow an attacker to hijack sessions of users connected to the system.

CVE-2021-38466 inhandnetworks vulnerability CVSS: 4.3 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not perform sufficient input validation on client requests from the help page. This may allow an attacker to perform a reflected cross-site scripting attack, which could allow an attacker to run code on behalf of the client browser.

CVE-2021-38464 inhandnetworks vulnerability CVSS: 5.8 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have inadequate encryption strength, which may allow an attacker to intercept the communication and steal sensitive information or hijack the session.

CVE-2021-38462 inhandnetworks vulnerability CVSS: 7.5 19 Oct 2021, 13:15 UTC

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf.