An OS command injection vulnerability exists in the web interface mac2name functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43092 | An OS command injection vulnerability exists in the web interface mac2name functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 05 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:peplink:smart_reader:v1.2.0:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 21 Aug 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |
|
| CPEs | cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:* cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-11-04T18:16:28.588Z
Reserved: 2023-11-22T15:49:49.717Z
Link: CVE-2023-39367
Updated: 2025-11-04T18:16:28.588Z
Status : Modified
Published: 2024-04-17T13:15:06.920
Modified: 2025-11-04T19:15:54.377
Link: CVE-2023-39367
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD