-
Notifications
You must be signed in to change notification settings - Fork 14.5k
Create escpos_tcp_command_injector.rb #20478
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Clean up ESC/POS printer command injector: remove unnecessary HEX_COMMANDS feature, add documentation, references, and comments
Thanks for your pull request! Before this can be merged, we need the following documentation for your module: |
I'm new to contributing here and this is my first PR. Could I get some clarification on what kind of documentation you'd like for this module? |
Welcome!
Refer to the links here: #20478 (comment)
Please also validate your markdown formatted documentation with
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you @futileskills for this module! It looks great! I just left a few comments and suggestions for you to review when you get a chance.
documentation/modules/auxiliary/admin/printer/escpos_tcp_command_injector.md
Show resolved
Hide resolved
Thank you! I really appreciate your feedback! I'm just starting to learn Ruby so take it easy on me lol. |
Okay, I think I got everything working. The only thing that I still want to add is additional in depth documentation for this module, but i figured I can add the link to that later on. - Once I finish it. It will be more of a in-depth documentation of what I have learned and the main concept behind the module. Here is what I have so far: https://github.com/futileskills/ESCPOS-Injector-Documentation- If there is anything else y'all would like to see please let me know and thank you again for all the help! @bcoles @cdelafuente-r7 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you @futileskills for making the changes. I just left one more comment, but otherwise it looks good to me. Someone else from R7 will take over and do a second round of review/testing (if possible). Thanks again for your contribution.
documentation/modules/auxiliary/admin/printer/escpos_tcp_command_injector.md
Show resolved
Hide resolved
Thank you! Glad to be able to finally contribute. |
Add ESC/POS Printer Command Injector Module for Epson-Compatible Printers
Description:
This PR introduces a new auxiliary module to Metasploit that exploits an unauthenticated ESC/POS command vulnerability in networked Epson-compatible printers. The vulnerability allows an attacker to send crafted commands over the network to inject custom ESC/POS print commands, which are used in various receipt printers.
Key Features:
Vulnerable Target:
Module Options:
Exploit Details:
The exploit uses the ESC/POS command sequence to:
Potential Use Cases:
Notes:
CVE is pending, will update when I hear back.