CVE-2023-40146

A privilege escalation vulnerability exists in the /bin/login functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with hard-coded credentials and execute unblocked default busybox functionality to trigger this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:*
cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:*

History

21 Aug 2025, 18:01

Type Values Removed Values Added
References () https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 - () https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 - Vendor Advisory
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1868 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1868 - Exploit, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240822-0008/ - () https://security.netapp.com/advisory/ntap-20240822-0008/ - Third Party Advisory
First Time Peplink smart Reader
Peplink
Peplink smart Reader Firmware
CWE CWE-798
CPE cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:*
cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:*

21 Nov 2024, 08:18

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de escalada de privilegios en la funcionalidad /bin/login de Peplink Smart Reader v1.2.0 (en QEMU). Un argumento de línea de comando especialmente manipulado puede conducir a un escape de shell limitado y capacidades elevadas. Un atacante puede autenticarse con credenciales codificadas y ejecutar la funcionalidad de Busybox predeterminada desbloqueada para desencadenar esta vulnerabilidad.
References
  • () https://security.netapp.com/advisory/ntap-20240822-0008/ -
References () https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 - () https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 -
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1868 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1868 -

17 Apr 2024, 17:15

Type Values Removed Values Added
References
  • {'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1868', 'source': 'talos-cna@cisco.com'}

17 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1868 -

17 Apr 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 13:15

Updated : 2025-08-21 18:01


NVD link : CVE-2023-40146

Mitre link : CVE-2023-40146

CVE.ORG link : CVE-2023-40146


JSON object : View

Products Affected

peplink

  • smart_reader
  • smart_reader_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-798

Use of Hard-coded Credentials