Skip to main content

CVE-2025-22470: Unrestricted upload of file with dangerous type in SATO Corporation CL4/6NX Plus

Critical
VulnerabilityCVE-2025-22470cvecve-2025-22470
Published: Wed Aug 06 2025 (08/06/2025, 09:52:16 UTC)
Source: CVE Database V5
Vendor/Project: SATO Corporation
Product: CL4/6NX Plus

Description

CL4/6NX Plus and CL4/6NX-J Plus (Japan model) with the firmware versions prior to 1.15.5-r1 allow crafted dangerous files to be uploaded. An arbitrary Lua script may be executed on the system with the root privilege.

AI-Powered Analysis

AILast updated: 08/06/2025, 10:17:44 UTC

Technical Analysis

CVE-2025-22470 is a critical vulnerability affecting SATO Corporation's CL4/6NX Plus and CL4/6NX-J Plus (Japan model) barcode label printers running firmware versions prior to 1.15.5-r1. The flaw allows an attacker to upload files of dangerous types without restriction, specifically crafted to execute arbitrary Lua scripts on the device with root privileges. This means that an unauthenticated remote attacker can exploit this vulnerability over the network without any user interaction, leading to full system compromise. The vulnerability arises from insufficient validation of uploaded files, enabling execution of malicious code embedded in Lua scripts. Given the device's role in industrial and commercial environments for label printing, exploitation could lead to unauthorized control over the printer, manipulation of printing tasks, disruption of operations, and potentially serve as a pivot point for lateral movement within an organization's network. The CVSS v3.0 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with ease of exploitation (network vector, no privileges or user interaction required). Although no known exploits are currently reported in the wild, the severity and straightforward exploitation vector make this a critical risk that demands immediate attention from affected organizations.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially in sectors relying heavily on automated labeling and logistics such as manufacturing, retail, pharmaceuticals, and supply chain management. Compromise of these printers could lead to unauthorized disclosure of sensitive labeling information, alteration of product labels causing regulatory non-compliance, and disruption of operational workflows. Since these printers often integrate into broader industrial control or enterprise networks, attackers gaining root access could leverage the device as a foothold to escalate privileges and move laterally, potentially impacting critical infrastructure or business continuity. Additionally, manipulation of printed labels could cause safety risks or financial losses due to mislabeling. The lack of authentication and user interaction requirements increases the risk of widespread exploitation if devices are exposed to untrusted networks or insufficiently segmented environments.

Mitigation Recommendations

Organizations should immediately verify the firmware version of all deployed SATO CL4/6NX Plus and CL4/6NX-J Plus printers and upgrade to firmware version 1.15.5-r1 or later where this vulnerability is patched. If immediate patching is not feasible, network segmentation should be enforced to isolate these printers from untrusted networks and restrict access to trusted administrators only. Implement strict access controls and monitor network traffic for unusual upload attempts or unauthorized Lua script executions. Disable or restrict file upload functionalities if not required. Additionally, conduct regular audits of device configurations and logs to detect potential exploitation attempts. Vendors and integrators should be engaged to ensure secure deployment practices and timely updates. Finally, organizations should incorporate these devices into their vulnerability management and incident response plans to rapidly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-01-07T02:31:49.639Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68932845ad5a09ad00f04b07

Added to database: 8/6/2025, 10:02:45 AM

Last enriched: 8/6/2025, 10:17:44 AM

Last updated: 8/18/2025, 11:31:05 PM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats