A privilege escalation vulnerability exists in the /bin...
Moderate severity
Unreviewed
Published
Apr 17, 2024
to the GitHub Advisory Database
•
Updated Apr 17, 2024
Description
Published by the National Vulnerability Database
Apr 17, 2024
Published to the GitHub Advisory Database
Apr 17, 2024
Last updated
Apr 17, 2024
A privilege escalation vulnerability exists in the /bin/login functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with hard-coded credentials and execute unblocked default busybox functionality to trigger this vulnerability.
References