CVE-2025-22470

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious Lua script files to affected SATO CL4/6NX Plus printers and execute them with root privileges. It affects SATO CL4/6NX Plus and CL4/6NX-J Plus printers with firmware versions prior to 1.15.5-r1. Attackers can achieve complete system compromise through this file upload vulnerability.

💻 Affected Systems

Products:
  • SATO CL4/6NX Plus
  • SATO CL4/6NX-J Plus (Japan model)
Versions: All firmware versions prior to 1.15.5-r1
Operating Systems: Embedded printer firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both standard and Japan-specific models. The vulnerability exists in the file upload functionality of the printer's web interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root privileges, allowing installation of persistent backdoors, data exfiltration, lateral movement to other network devices, and disruption of printing operations.

🟠

Likely Case

Remote code execution leading to printer compromise, credential theft, network reconnaissance, and potential ransomware deployment on vulnerable printers.

🟢

If Mitigated

Limited impact if network segmentation isolates printers and file upload functionality is restricted through access controls.

🌐 Internet-Facing: HIGH - Printers exposed to the internet can be directly exploited without authentication, leading to immediate compromise.
🏢 Internal Only: HIGH - Even internally, any attacker with network access to the printer can exploit this vulnerability to gain root access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated file upload leading to RCE, making exploitation straightforward for attackers with network access to the printer.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.15.5-r1

Vendor Advisory: https://www.sato-global.com/support_notices/240830/

Restart Required: Yes

Instructions:

1. Download firmware version 1.15.5-r1 from SATO support portal. 2. Access printer web interface. 3. Navigate to firmware update section. 4. Upload and apply the new firmware. 5. Reboot printer after update completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate printers on separate VLANs with strict firewall rules limiting access to necessary ports only.

Disable Unnecessary Services

all

Disable web interface if not required for operations, or restrict access to specific management IPs only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit printer access to authorized management systems only
  • Monitor printer network traffic for unusual file upload attempts and Lua script execution patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version via printer web interface or serial console. If version is below 1.15.5-r1, the system is vulnerable.

Check Version:

Access printer web interface at http://[printer-ip]/ and navigate to System Information or Settings page to view firmware version.

Verify Fix Applied:

Confirm firmware version shows 1.15.5-r1 or higher in printer settings. Test file upload functionality to ensure malicious files are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload attempts to printer web interface
  • Lua script execution in printer logs
  • Multiple failed authentication attempts followed by successful file upload

Network Indicators:

  • HTTP POST requests to printer upload endpoints with Lua file extensions
  • Unusual outbound connections from printer to external IPs
  • Traffic patterns indicating command and control communication

SIEM Query:

source="printer_logs" AND (event="file_upload" OR event="script_execution" OR file_extension=".lua")

🔗 References

📤 Share & Export