{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T06:05:39.417","vulnerabilities":[{"cve":{"id":"CVE-2024-51982","sourceIdentifier":"cve@rapid7.com","published":"2025-06-25T08:15:32.650","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An unauthenticated attacker who can connect to TCP port 9100 can issue a Printer Job Language (PJL) command that will crash the target device. The device will reboot, after which the attacker can reissue the command to repeatedly crash the device. A malformed PJL variable FORMLINES is set to a non number value causing the target to crash."},{"lang":"es","value":"Un atacante no autenticado que se conecte al puerto TCP 9100 puede ejecutar un comando de lenguaje de trabajo de impresora (PJL) que bloqueará el dispositivo objetivo. Este se reiniciará, tras lo cual el atacante puede volver a ejecutar el comando para bloquearlo repetidamente. Una variable PJL mal formada, FORMLINES, se establece en un valor distinto de un número, lo que provoca el bloqueo del dispositivo objetivo."}],"metrics":{"cvssMetricV31":[{"source":"cve@rapid7.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"cve@rapid7.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1286"}]}],"references":[{"url":"https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf","source":"cve@rapid7.com"},{"url":"https://github.com/sfewer-r7/BrotherVulnerabilities","source":"cve@rapid7.com"},{"url":"https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100846_000","source":"cve@rapid7.com"},{"url":"https://www.fujifilm.com/fbglobal/eng/company/news/notice/2025/0625_announce.html","source":"cve@rapid7.com"},{"url":"https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed","source":"cve@rapid7.com"},{"url":"https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000007","source":"cve@rapid7.com"},{"url":"https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}}]}