Rooting a Printer: From Security Bulletin to Remote Code Execution
http://www.tenable.com/blog/rooting-a-printer-from-security-bulletin-to-remote-code-execution [www.tenable.com]
2017-06-15 19:02
To summarize, don’t overlook printers in your threat model. A printer is a computer and it should be treated like one. Scan it. Update it. Monitor it. Who knows what might lurk within?
source: solar