Response to vulnerability in some Toshiba Tec's
digital multi-function peripherals

June 25, 2025
Toshiba Tec Corporation

Thank you for using our products.

The following vulnerabilities have been identified in some of our multi-function peripherals. This issue does not result in the leakage of information from the product to outside parties.

Vulnerability details

Target Products : e-STUDIO 301DN/ 302DNF (These products have been sold only in the Chinese market.)

For more information, see the reference sites below (Jump to another website with opening new window.):

Reference Reference site
CVE-2017-9765
JVNVU#98807587
https://www.cve.org/CVERecord?id=CVE-2017-9765
Stack Buffer Overflow Vulnerability
CVE-2024-2169
VNVU#93188600
https://www.cve.org/CVERecord?id=CVE-2024-2169
Infinite loop of messages between servers
CVE-2024-51977
JVNVU#90043828
https://www.cve.org/CVERecord?id=CVE-2024-51977
Possibility of information leakage in the printer
CVE-2024-51978
JVNVU#90043828
https://www.cve.org/CVERecord?id=CVE-2024-51978
Possibility of authentication bypass
CVE-2024-51980
JVNVU#90043828
https://www.cve.org/CVERecord?id=CVE-2024-51980
Possibility of being forced to connect to TCP
CVE-2024-51981
JVNVU#90043828
https://www.cve.org/CVERecord?id=CVE-2024-51981
Possibility of arbitrary HTTP request execution
CVE-2024-51983
JVNVU#90043828
https://www.cve.org/CVERecord?id=CVE-2024-51983
External attacks can cause your device to crash
CVE-2024-51984
JVNVU#90043828
https://www.cve.org/CVERecord?id=CVE-2024-51984
Possibility of information leakage in the printer due to passback attacks

Solution

Ask your service company to update the main unit software.

Workaround

If you are using a product for which the firmware is not yet available, please use the workaround methods below.

  1. Make sure you use the printer in a firewall-protected network environment in the office or with a router at home.
  2. In addition, if necessary, change the following settings individually from "Web browser settings" of the product itself.
Reference Workaround
CVE-2017-9765 Disable the WSD function.
CVE-2024-2169 Disable TFTP.
CVE-2024-51977 Disable "Web browser settings" on the product itself.
CVE-2024-51978 Change the administrator password from the default value.
CVE-2024-51980 Disable the WSD function.
CVE-2024-51981 Disable the WSD function.
CVE-2024-51983 Disable the WSD function.
CVE-2024-51984 Change the administrator password from the default value.

Acknowledgements

We would like to thank Yepeng Pan of CISPA, Germany, for reporting this vulnerability (CVE-2024-2169).
We would like to thank Stephen Fewer, Principal Security Researcher at Rapid7, USA, for reporting these vulnerabilities (CVE-2024-51977 - CVE-2024-51984).