Lucene search

K
cve[email protected]CVE-2023-45744
HistoryApr 17, 2024 - 1:15 p.m.

CVE-2023-45744

2024-04-1713:15:07
CWE-284
web.nvd.nist.gov
33
web interface
configuration modification
http request
unauthenticated access
security vulnerability
peplink smart reader

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H

6.6 Medium

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.6%

A data integrity vulnerability exists in the web interface /cgi-bin/upload_config.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to configuration modification. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.

Affected configurations

Vulners
Node
peplinkmbxRangev1.2.0 (in QEMU)
VendorProductVersionCPE
peplinkmbx*cpe:2.3:h:peplink:mbx:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Peplink",
    "product": "Smart Reader",
    "versions": [
      {
        "version": "v1.2.0 (in QEMU)",
        "status": "affected"
      }
    ]
  }
]

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H

6.6 Medium

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.6%

Related for CVE-2023-45744