### [CVE-2024-33610](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33610) ![](https://img.shields.io/static/v1?label=Product&message=Multiple%20MFPs%20(multifunction%20printers)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=See%20the%20information%20provided%20by%20Sharp%20Corporation%20listed%20under%20%5BReferences%5D%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=See%20the%20information%20provided%20by%20Toshiba%20Tec%20Corporation%20listed%20under%20%5BReferences%5D%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel&color=brightgreen) ### Description "sessionlist.html" and "sys_trayentryreboot.html" are accessible with no authentication. "sessionlist.html" provides logged-in users' session information including session cookies, and "sys_trayentryreboot.html" allows to reboot the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]. ### POC #### Reference - https://jvn.jp/en/vu/JVNVU93051062/ - https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html #### Github - https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cve-scores