CVE-2024-51978
CRITICAL EXPLOITED NUCLEIUnknown Device - Info Disclosure
Title source: llmDescription
An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.
Exploits (1)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/BrotherPrinter-CVE-2024-51978-defaultPasswd.py
Nuclei Templates (1)
Brother Printers – Authentication Bypass via Default Admin Password
CRITICALby iamnoooob,pdresearch,MathematicianGoat
FOFA:
app="brother-Printer"
Scores
CVSS v3
9.8
EPSS
0.4834
EPSS Percentile
97.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2025-08-06
Classification
CWE
CWE-1391
Status
draft
Timeline
Published
Jun 25, 2025
Tracked Since
Feb 18, 2026