Lucene search

K
zdi@quangnh89 and @ExLuck99ZDI-24-093
HistoryFeb 06, 2024 - 12:00 a.m.

(Pwn2Own) Canon imageCLASS MF753Cdw SLP service-url Stack-based Buffer Overflow Remote Code Execution Vulnerability

2024-02-0600:00:00
@quangnh89 and @ExLuck99
www.zerodayinitiative.com
24
canon
imageclass mf753cdw
buffer overflow
code execution
vulnerability
service location protocol
network-adjacent
authentication
validation

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.0%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Canon imageCLASS MF753Cdw printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the service-url parameter provided to the Service Location Protocol endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.0%

Related for ZDI-24-093