CVE-2024-51978

CRITICAL EXPLOITED NUCLEI

Unknown Device - Info Disclosure

Title source: llm

Description

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

Exploits (1)

github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/BrotherPrinter-CVE-2024-51978-defaultPasswd.py

Nuclei Templates (1)

Brother Printers – Authentication Bypass via Default Admin Password
CRITICALby iamnoooob,pdresearch,MathematicianGoat
FOFA: app="brother-Printer"

Scores

CVSS v3 9.8
EPSS 0.4834
EPSS Percentile 97.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2025-08-06

Classification

CWE
CWE-1391
Status draft

Timeline

Published Jun 25, 2025
Tracked Since Feb 18, 2026