A privilege escalation vulnerability exists in the /bin/login functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with hard-coded credentials and execute unblocked default busybox functionality to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 22 Aug 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
MITRE
Status: PUBLISHED
Assigner: talos
Published: 2024-04-17T12:55:47.083Z
Updated: 2024-08-22T18:03:10.122Z
Reserved: 2023-11-22T15:53:45.393Z
Link: CVE-2023-40146
Vulnrichment
Updated: 2024-08-22T18:03:10.122Z
NVD
Status : Awaiting Analysis
Published: 2024-04-17T13:15:07.143
Modified: 2024-04-17T17:15:12.513
Link: CVE-2023-40146
Redhat
No data.