Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44753 | A privilege escalation vulnerability exists in the /bin/login functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with hard-coded credentials and execute unblocked default busybox functionality to trigger this vulnerability. |
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 21 Aug 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |
|
| Weaknesses | CWE-798 | |
| CPEs | cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:* cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Peplink
Peplink smart Reader Peplink smart Reader Firmware |
Thu, 22 Aug 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-11-04T18:16:38.419Z
Reserved: 2023-11-22T15:53:45.393Z
Link: CVE-2023-40146
Updated: 2024-08-22T18:03:10.122Z
Status : Modified
Published: 2024-04-17T13:15:07.143
Modified: 2025-11-04T19:15:55.627
Link: CVE-2023-40146
No data.
OpenCVE Enrichment
No data.
EUVD