A privilege escalation vulnerability exists in the /bin/login functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with hard-coded credentials and execute unblocked default busybox functionality to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |
|
Weaknesses | CWE-798 | |
CPEs | cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:* cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |
Thu, 22 Aug 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: talos
Published: 2024-04-17T12:55:47.083Z
Updated: 2024-08-22T18:03:10.122Z
Reserved: 2023-11-22T15:53:45.393Z
Link: CVE-2023-40146

Updated: 2024-08-22T18:03:10.122Z

Status : Analyzed
Published: 2024-04-17T13:15:07.143
Modified: 2025-08-21T18:01:30.480
Link: CVE-2023-40146

No data.