InHand Networks InRouter
InHand Networks InRouter302 and InRouter615 devices contain multiple vulnerabilities that allow MQTT command injection, unauthorized information disclosure, and remote code execution. Successful exploitation could result in an attacker gaining full control over cloud-managed InRouter devices reachable via the internet. The vulnerabilities stem from weak or missing input validation (CWE-78, CWE-319), weak credential generation (CWE-330), improper access control (CWE-284), and credential storage issues (CWE-760). An attacker with network access to the device or cloud service can exploit these without authentication to execute arbitrary code, intercept sensitive data, or manipulate device behavior through malicious MQTT messages.
- Network connectivity to the InRouter or its cloud management service
- No credentials required for initial exploitation
- Device is reachable via cloud (internet-accessible)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5bb3b284-e0ba-477d-96f5-45315d4f398b