Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-23767

EPSS 0.07% · P20
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-23767

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
ESC/POS, a printer control language designed by Seiko Epson Corporation, lacks mechanisms for user authentication and command authorization, does not provide controls to restrict sources or destinations of network communication, and transmits commands without encryption or integrity protection.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键功能的认证机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
EPSON ESC/POS 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
EPSON ESC/POS是日本爱普生(EPSON)公司的一个用于控制POS打印机的协议。 EPSON ESC/POS存在访问控制错误漏洞,该漏洞源于缺少用户身份验证和命令授权机制、未提供网络通信源或目标限制控制以及传输命令时未加密或提供完整性保护。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Seiko Epson CorporationESC/POS All products implementing ESC/POS -

II. Public POCs for CVE-2026-23767

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-23767

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-23767

No comments yet


Leave a comment