CVE-2023-39367

An OS command injection vulnerability exists in the web interface mac2name functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Configurations

No configuration.

History

21 Nov 2024, 08:15

Type Values Removed Values Added
References () https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 - () https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 -
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1867 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1867 -

17 Apr 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 13:15

Updated : 2024-11-21 08:15


NVD link : CVE-2023-39367

Mitre link : CVE-2023-39367

CVE.ORG link : CVE-2023-39367


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')