Browse all 11 CVE security advisories affecting Peplink. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Peplink specializes in enterprise networking solutions, particularly SD-WAN and router systems for distributed organizations. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation flaws. The company maintains an average severity level for its CVEs, with several critical RCE issues addressed in recent years. While no major public security incidents have been documented, Peplink's products have been targeted in exploit campaigns due to their widespread use in critical infrastructure. Their security posture includes regular firmware updates and a bug bounty program, though the 11 documented CVEs suggest ongoing vigilance is required for organizations implementing their networking solutions.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-43491 | Peplink Smart Reader 访问控制错误漏洞 — Smart ReaderCWE-284 | 5.3 | Medium | 2024-04-17 |
| CVE-2023-45209 | Peplink Smart Reader 访问控制错误漏洞 — Smart ReaderCWE-284 | 5.3 | Medium | 2024-04-17 |
| CVE-2023-39367 | Peplink Smart Reader 操作系统命令注入漏洞 — Smart ReaderCWE-78 | 9.1 | Critical | 2024-04-17 |
| CVE-2023-45744 | Peplink Smart Reader 访问控制错误漏洞 — Smart ReaderCWE-284 | 8.3 | High | 2024-04-17 |
| CVE-2023-40146 | Peplink Smart Reader 命令注入漏洞 — Smart ReaderCWE-77 | 6.8 | Medium | 2024-04-17 |
This page lists every published CVE security advisory associated with Peplink. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.