Show filters
23 Total Results
Displaying 1-10 of 23
Sort by:
Attacker Value
Unknown

CVE-2023-45744

Disclosure Date: April 17, 2024 (last updated January 05, 2025)
A data integrity vulnerability exists in the web interface /cgi-bin/upload_config.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to configuration modification. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2023-45209

Disclosure Date: April 17, 2024 (last updated January 05, 2025)
An information disclosure vulnerability exists in the web interface /cgi-bin/download_config.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2023-43491

Disclosure Date: April 17, 2024 (last updated January 05, 2025)
An information disclosure vulnerability exists in the web interface /cgi-bin/debug_dump.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2023-40146

Disclosure Date: April 17, 2024 (last updated January 05, 2025)
A privilege escalation vulnerability exists in the /bin/login functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with hard-coded credentials and execute unblocked default busybox functionality to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2023-39367

Disclosure Date: April 17, 2024 (last updated January 05, 2025)
An OS command injection vulnerability exists in the web interface mac2name functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2023-49230

Disclosure Date: December 28, 2023 (last updated January 05, 2024)
An issue was discovered in Peplink Balance Two before 8.4.0. A missing authorization check in captive portals allows attackers to modify the portals' configurations without prior authentication.
Attacker Value
Unknown

CVE-2023-49229

Disclosure Date: December 28, 2023 (last updated January 05, 2024)
An issue was discovered in Peplink Balance Two before 8.4.0. A missing authorization check in the administration web service allows read-only, unprivileged users to obtain sensitive information about the device configuration.
Attacker Value
Unknown

CVE-2023-49228

Disclosure Date: December 28, 2023 (last updated January 05, 2024)
An issue was discovered in Peplink Balance Two before 8.4.0. Console port authentication uses hard-coded credentials, which allows an attacker with physical access and sufficient knowledge to execute arbitrary commands as root.
Attacker Value
Unknown

CVE-2023-49226

Disclosure Date: December 25, 2023 (last updated January 04, 2024)
An issue was discovered in Peplink Balance Two before 8.4.0. Command injection in the traceroute feature of the administration console allows users with admin privileges to execute arbitrary commands as root.
Attacker Value
Unknown

CVE-2023-35194

Disclosure Date: October 11, 2023 (last updated October 19, 2023)
An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset `0x4bde44`.