Command Execution Vulnerability in Epson POS Printers Connected to a Network

Description: The host PC on the same network as the POS printers is designed to send the commands to port 9100 (port for printing) of the printer's network interface without any authentication.

Impact: The vulnerability allows a remote attacker to connect to a printer's network interface and send raw, unauthenticated ESC/POS commands.

Solution: To view affected models and see workaround solutions, view the IP Filtering Configuration Guide.