Lucene search

K
cveTalosCVE-2023-45744
HistoryApr 17, 2024 - 1:15 p.m.

CVE-2023-45744

2024-04-1713:15:07
CWE-284
talos
web.nvd.nist.gov
38
web interface
configuration modification
http request
unauthenticated access
security vulnerability
peplink smart reader

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

17.8%

A data integrity vulnerability exists in the web interface /cgi-bin/upload_config.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to configuration modification. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.

Affected configurations

Vulners
Vulnrichment
Node
peplinksmart_readerRangev1.2.0 (in QEMU)
VendorProductVersionCPE
peplinksmart_reader*cpe:2.3:a:peplink:smart_reader:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Peplink",
    "product": "Smart Reader",
    "versions": [
      {
        "version": "v1.2.0 (in QEMU)",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

17.8%