An OS command injection vulnerability exists in the web interface mac2name functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Aug 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |
|
| CPEs | cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:* cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |
Status: PUBLISHED
Assigner: talos
Published: 2024-04-17T12:55:47.790Z
Updated: 2024-08-02T18:10:20.216Z
Reserved: 2023-11-22T15:49:49.717Z
Link: CVE-2023-39367
Updated: 2024-08-02T18:10:20.216Z
Status : Analyzed
Published: 2024-04-17T13:15:06.920
Modified: 2025-08-21T18:01:22.747
Link: CVE-2023-39367
No data.