Vulnerability in ESC/POS command for POS printers - Frequently Asked Questions

Vulnerability in ESC/POS command for POS printers

Vulnerability Reference: CVE-2026-23767

Description:

ESC/POS is a command system for controlling POS printers.
Vulnerabilities related to the communication specifications of ESC/POS command have been reported.

Vulnerabilities:

ESC/POS commands are sent and received between the printer and the network via the TCP/9100 port.
Note: TCP/9100 is a standard communication path for a network printer to receive print data directly from a host and execute printing.

ESC/POS and TCP/9100 are designed for use in closed networks and do not have pre-defined authentication
or encryption mechanisms, leading to the following vulnerabilities.

  • No restrictions on sender

Any host in the network to which the printer is connected can send and execute any command to the printer.

  • Communications are not encrypted

An attacker within the network to which the printer is connected can exploit communication content.
Note: The printer drivers of EPSON also use ESC/POS commands to print.

 

Impact:

There are no reports of attacks exploiting this vulnerability until now.

Solution:

To ensure the security of your EPSON product, we recommend end-users and their administrators to implement and maintain industry-standard security controls and practices in setting up and managing network to which the product is connected.

<Internet Connection>

  • Do not connect the product directly to the Internet; install it within a network protected by a firewall.
  • Please set a private IP address for the product.

For more information on securing your EPSON product, please refer “Security Guidebook for customers using POS Printers”.
The security guidebook is available on the following website:
Security for printers and MFPs

 

Affected Products

For more information on securing your EPSON product, please refer “Security Guidebook for customers using POS Printers”.

TM-H6000V, TM-H6000VI
TM-L100
TM-m10, TM-m30, TM-m30II(-H,-NT,-S, -SL), TM-m30III(C, -H)
TM-m50, TM-m50II(-H)
TM-P20, TM-P80, TM-P20II, TM-P60II, TM-P80II
TM-T20III(L), TM-T20IV(-L, -SP), TM-T20X(-II)
TM-T81III, TM-T82III(L), TM-T82IV(-L), TM-T82X(-II), TM-T83III, TM-T83IV
TM-T88VI(-Hub), TM-T88VII,
TM-T100
UB-E04, UB-R04, UB-R05

Credit:
We would like to thank security researcher Michael CookFutileSkillsfor his extensive work in identifying and sharing this security issue with us.