An OS command injection vulnerability exists in the web interface mac2name functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |
|
CPEs | cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:* cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |

Status: PUBLISHED
Assigner: talos
Published: 2024-04-17T12:55:47.790Z
Updated: 2024-08-02T18:10:20.216Z
Reserved: 2023-11-22T15:49:49.717Z
Link: CVE-2023-39367

Updated: 2024-08-02T18:10:20.216Z

Status : Analyzed
Published: 2024-04-17T13:15:06.920
Modified: 2025-08-21T18:01:22.747
Link: CVE-2023-39367

No data.