A privilege escalation vulnerability exists in the /bin/login functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with hard-coded credentials and execute unblocked default busybox functionality to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 21 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Peplink
Peplink smart Reader
Peplink smart Reader Firmware
Weaknesses CWE-798
CPEs cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:*
cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:*
Vendors & Products Peplink
Peplink smart Reader
Peplink smart Reader Firmware

Thu, 22 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-08-22T18:03:10.122Z

Reserved: 2023-11-22T15:53:45.393Z

Link: CVE-2023-40146

cve-icon Vulnrichment

Updated: 2024-08-22T18:03:10.122Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-17T13:15:07.143

Modified: 2025-08-21T18:01:30.480

Link: CVE-2023-40146

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.