CVE-2026-6180 POC (Proof-of-Concept)

CVE-2026-6180 POC (Proof-of-Concept)

A race condition exists in PaperCut MF when processing badge-swipe data from certain HP multifunction devices. Under specific network conditions involving dropped packets and out-of-order sequence counters, the server may incorrectly process fragmented data chunks. If a sequence reset notification fails to reach the server, the server may reject the initial data chunk while erroneously accepting subsequent chunks before a connection reset completes.

This leads to the registration of a truncated badge ID string. While this typically results in an authentication failure, the vulnerability is compounded in environments utilizing custom badge-ID post-processing scripts. In such configurations, the truncated string may be transformed into a valid ID belonging to a different user, leading to unauthorized session establishment (Incorrect User Login) on the device.

Published: 2026-05-05

CVSS: 8.1

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Download CVE-2026-6180 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://hokyo.gr/poc-310-cve-2026-42222/

https://hokyo.gr/poc-402-cve-2026-7854/

https://hokyo.gr/poc-57-cve-2026-31739/

https://hokyo.gr/poc-680-cve-2026-41413/

Copyright 2017- 2025 Hokyo JapanEats ©