Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fqhp-q65q-7rff

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Kyocera 3830 (aka FS-3830N) printers have a back door that allows remote attackers to read and alter configuration settings via strings that begin with "!R!SIOP0", as demonstrated using (1) a connection to to TCP port 9100 or (2) the UNIX lp command.

Kyocera 3830 (aka FS-3830N) printers have a back door that allows remote attackers to read and alter configuration settings via strings that begin with "!R!SIOP0", as demonstrated using (1) a connection to to TCP port 9100 or (2) the UNIX lp command.

EPSS

Процентиль: 25%
0.00085
Низкий

Связанные уязвимости

nvd
почти 20 лет назад

Kyocera 3830 (aka FS-3830N) printers have a back door that allows remote attackers to read and alter configuration settings via strings that begin with "!R!SIOP0", as demonstrated using (1) a connection to to TCP port 9100 or (2) the UNIX lp command.

EPSS

Процентиль: 25%
0.00085
Низкий