### [CVE-2024-28038](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28038) ![](https://img.shields.io/static/v1?label=Product&message=Multiple%20MFPs%20(multifunction%20printers)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=See%20the%20information%20provided%20by%20Sharp%20Corporation%20listed%20under%20%5BReferences%5D%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=See%20the%20information%20provided%20by%20Toshiba%20Tec%20Corporation%20listed%20under%20%5BReferences%5D%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Stack-based%20buffer%20overflow&color=brightgreen) ### Description The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]. ### POC #### Reference - https://jvn.jp/en/vu/JVNVU93051062/ - https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html #### Github No PoCs found on GitHub currently.