Peplink Security Advisory: Smart Reader Firmware 1.2.0 (CVE-2023-43491, CVE-2023-45209, CVE-2023-39367, CVE-2023-45744, CVE-2023-40146)

Background
Recently, we have communicated with a security research lab that has informed us that they have found vulnerabilities in Peplink Smart Reader firmware version 1.2.0. Details are below:

1. Information disclosure vulnerability (CVE-2023-43491)

  • Peplink reference no. #31986, external reference link can be found here.
  • Description:
    An information disclosure vulnerability exists in the web interface of Peplink Smart Reader v1.2.0. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.

2. Information disclosure vulnerability (CVE-2023-45209)

  • Peplink reference no. #31987, external reference link can be found here.
  • Description:
    An information disclosure vulnerability exists in the web interface of Peplink Smart Reader v1.2.0. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.

3. Command injection vulnerability (CVE-2023-39367)

  • Peplink reference no. #31989, external reference link can be found here.
  • Description:
    An OS command injection vulnerability exists in the web interface of Peplink Smart Reader v1.2.0. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

4. Data integrity vulnerability (CVE-2023-45744)

  • Peplink reference no. #31988, external reference link can be found here.
  • Description:
    A data integrity vulnerability exists in the web interface of Peplink Smart Reader v1.2.0. A specially crafted HTTP request can lead to configuration modification. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.

5. Privilege escalation vulnerability (CVE-2023-40146)

  • Peplink reference no. #31990, external reference link can be found here.
  • Description:
    A privilege escalation vulnerability exists in the web interface of Peplink Smart Reader v1.2.0. A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with hard-coded credentials and execute unblocked default OS functionality to trigger this vulnerability.

Product
The vulnerabilities were identified in the Peplink Smart Reader in the firmware version 1.2.0.

Solution
It has been fixed in the firmware version 1.2.1, which is announced here, and this is the link for firmware download.

Published: 2024-04-17

3 Likes