CVE-2023-39367

An OS command injection vulnerability exists in the web interface mac2name functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:*
cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:*

History

21 Aug 2025, 18:01

Type Values Removed Values Added
CPE cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:*
cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:*
References () https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 - () https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 - Vendor Advisory
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1867 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1867 - Exploit, Third Party Advisory
First Time Peplink smart Reader
Peplink
Peplink smart Reader Firmware

21 Nov 2024, 08:15

Type Values Removed Values Added
References () https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 - () https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 -
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1867 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1867 -
Summary
  • (es) Existe una vulnerabilidad de inyección de comandos del sistema operativo en la funcionalidad mac2name de la interfaz web de Peplink Smart Reader v1.2.0 (en QEMU). Una solicitud HTTP especialmente manipulada puede provocar la ejecución de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad.

17 Apr 2024, 17:15

Type Values Removed Values Added
References
  • {'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1867', 'source': 'talos-cna@cisco.com'}

17 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1867 -

17 Apr 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 13:15

Updated : 2025-08-21 18:01


NVD link : CVE-2023-39367

Mitre link : CVE-2023-39367

CVE.ORG link : CVE-2023-39367


JSON object : View

Products Affected

peplink

  • smart_reader
  • smart_reader_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')