CVE-2023-39367
📋 TL;DR
An OS command injection vulnerability in Peplink Smart Reader v1.2.0 allows authenticated attackers to execute arbitrary commands via the web interface's mac2name functionality. This can lead to complete system compromise of affected devices. Organizations using Peplink Smart Reader v1.2.0 in QEMU environments are affected.
💻 Affected Systems
- Peplink Smart Reader
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover, data exfiltration, lateral movement to other network devices, and persistent backdoor installation.
Likely Case
Unauthorized access to device configuration, network reconnaissance, and potential data theft from connected systems.
If Mitigated
Limited impact with proper network segmentation, but still potential for device compromise within isolated segment.
🎯 Exploit Status
Exploit requires authentication but is straightforward once credentials are obtained; detailed technical analysis available in Talos report.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to firmware version beyond v1.2.0 as specified in vendor advisory
Restart Required: Yes
Instructions:
1. Download latest firmware from Peplink support portal. 2. Backup current configuration. 3. Upload firmware via web interface. 4. Apply update and restart device. 5. Verify successful update.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Smart Reader devices from critical networks and restrict web interface access
Access Control Restrictions
linuxImplement strict authentication controls and limit web interface access to trusted IPs only
iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Disable web interface if not required for operations
- Implement strict network segmentation and firewall rules to limit access to device
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface or SSH: cat /etc/version | grep '1.2.0'
Check Version:
cat /etc/version
Verify Fix Applied:
Verify firmware version is updated beyond v1.2.0 and test mac2name functionality with safe input
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution patterns in system logs
- Multiple failed authentication attempts followed by successful login
- HTTP requests to mac2name endpoint with suspicious parameters
Network Indicators:
- Unusual outbound connections from Smart Reader device
- HTTP traffic to mac2name endpoint containing shell metacharacters
SIEM Query:
source="smart_reader" AND (uri_path="/mac2name" AND (query="*;*" OR query="*|*" OR query="*`*"))
🔗 References
- https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1867
- https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1867
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1867