An OS command injection vulnerability exists in the web interface mac2name functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-43092 An OS command injection vulnerability exists in the web interface mac2name functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 19:30:00 +0000


Thu, 21 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Peplink
Peplink smart Reader
Peplink smart Reader Firmware
CPEs cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:*
cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:*
Vendors & Products Peplink
Peplink smart Reader
Peplink smart Reader Firmware

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-11-04T18:16:28.588Z

Reserved: 2023-11-22T15:49:49.717Z

Link: CVE-2023-39367

cve-icon Vulnrichment

Updated: 2024-08-02T18:10:20.216Z

cve-icon NVD

Status : Modified

Published: 2024-04-17T13:15:06.920

Modified: 2025-11-04T19:15:54.377

Link: CVE-2023-39367

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.