Description
RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.
References (2)
Core 2
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/Ainevsia/CVE-Request/tree/main/Ricoh/1
Vendor Advisory x_refsource_misc
https://www.ricoh.com/info/2022/0228_1/
Scores
CVSS v3
9.8
EPSS
0.0054
EPSS Percentile
67.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-787
Status
published
Products (50)
ricoh/aficio_sp_3500sf_firmware
1.06
ricoh/m_2700_firmware
ricoh/m_2701_firmware
ricoh/m_320_firmware
ricoh/m_320f_firmware
ricoh/m_320fb_firmware
ricoh/m_c2000_firmware
ricoh/m_c250fw_firmware
ricoh/m_c250fwb_firmware
ricoh/p_310_firmware
... and 40 more
Published
Feb 15, 2022
Tracked Since
Feb 18, 2026