Command execution vulnerability in Epson WebConfig - Frequently Asked Questions
Command execution vulnerability in Epson WebConfig
Vulnerability Reference: CVE-2025-66635
Description:
An administrator password is required to log in to WebConfig.
A malicious third party who obtains the administrator password can execute arbitrary commands by logging in to Web Config and entering a specific string on a specific screen.
Impact:
The product settings could be reset or ping packets could be sent to other devices.
There are no reports of attacks exploiting this vulnerability until now.
Solution:
We strongly recommend applying a fixed firmware or taking workaround to mitigate the impact of this vulnerability
- Apply fixed firmware:
For products that are currently on sale, we have released fixed firmware as listed below. Please download it from the Epson website and apply the update.
- Take workaround:
To ensure the security of your Epson product, we recommend end-users and their administrators to implement and maintain industry-standard security controls and practices in setting up and managing password and network to which the product is connected.
<Administrator Password>
✅ Please set a unique password for each product.
✅ The administrator password should be a complex string of characters that is difficult for others to guess, such as eight or more characters that contain not only English letters but also symbols and numbers.
<Internet Connection>
✅ Do not connect the product directly to the Internet; install it within a network protected by a firewall.
✅ Please set a private IP address for the product.
For more information on securing your Epson product, please refer “Security Guidelines”.
The security guidelines are available on the following website:
Security for printers and MFPs
Affected Products
Laser Printers
Large Format Printers – Affected Products Action and Firmware LFP.pdf
POS Printers – Affected Products Action and Firmware POS.pdf