Impact
ESC/POS, a printer control language used by Epson, lacks authentication, command authorization, controls over data origin and destination, and it transmits commands without encryption or integrity protection. An attacker who can reach the printer’s network interface could send arbitrary ESC/POS commands, resulting in unauthorized printing or denial of service. The description does not indicate that the attacker can execute firmware code or system code, only that commands are accepted without checks.
Affected Systems
This vulnerability affects Epson’s ESC/POS printers, including the SB‑H50, TM‑H6000V, TM‑L100, TM‑M10, and the TM‑M30 series (M30, M30II, M30III), the TM‑M55, the TM‑P20 series (P20, P20II), the TM‑P60II, the TM‑P80 series (P80, P80II), the TM‑T20 series (T20II, T20III), the TM‑T88VI, the TM‑T88VII, the UB‑E04, and the UB‑R04 models. All of these devices run firmware that exposes raw ESC/POS command interfaces without authentication or encryption, as reflected in the CPE entries provided.
Risk and Exploitability
The CVSS base score of 9.8 classifies this as a high severity vulnerability, but the EPSS score is below 1 %, indicating very low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, suggesting no widely known exploitation. Attackers are likely to target the ESC/POS service over the network; while the specific port number is not stated in the CVE description, it is inferred that the common port for raw printing (often TCP 9100) is used, and an attacker could inject malicious commands over an untrusted network.
OpenCVE Enrichment