A data integrity vulnerability exists in the web interface /cgi-bin/upload_config.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to configuration modification. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
References
| Link | Resource |
|---|---|
| https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 | Vendor Advisory |
| https://talosintelligence.com/vulnerability_reports/TALOS-2023-1866 | Exploit Third Party Advisory |
| https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20240828-0006/ | Third Party Advisory |
| https://talosintelligence.com/vulnerability_reports/TALOS-2023-1866 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Aug 2025, 18:01
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:peplink:smart_reader:-:*:*:*:*:*:*:* cpe:2.3:o:peplink:smart_reader_firmware:1.2.0:*:*:*:*:*:*:* |
|
| References | () https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 - Vendor Advisory | |
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1866 - Exploit, Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20240828-0006/ - Third Party Advisory | |
| CWE | NVD-CWE-noinfo | |
| First Time |
Peplink smart Reader
Peplink Peplink smart Reader Firmware |
Information
Published : 2024-04-17 13:15
Updated : 2025-08-21 18:01
NVD link : CVE-2023-45744
Mitre link : CVE-2023-45744
CVE.ORG link : CVE-2023-45744
JSON object : View
Products Affected
peplink
- smart_reader
- smart_reader_firmware
CWE
