First published: Wed Apr 17 2024(Updated: )
A privilege escalation vulnerability exists in the /bin/login functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with hard-coded credentials and execute unblocked default busybox functionality to trigger this vulnerability.
Credit: talos-cna@cisco.com
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.