You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Combine `WS`/`RS` (VM storage write/read) to stage values and perform a precise 32-bit write after pivot.
76
+
77
+
- Exploit outline:
78
+
1) Create XPS with the page above and include `/Resources/evil.ttf`.
79
+
2) In `fpgm`/`prep`, use `CINDEX` to leak and compute `stack_cur`.
80
+
3) Stage target value with `WS`; pivot with `DELTAP1` to the destination; use `RS` to write it (e.g., to a function pointer) to gain PC control.
81
+
82
+
- Send over 9100/tcp:
83
+
84
+
```bash
85
+
{ printf"@PJL ENTER LANGUAGE = XPS\r\n"; cat exploit.xps; } | nc -q0 <PRINTER_IP> 9100
86
+
```
87
+
88
+
-`exploit.xps` is a valid XPS ZIP containing `Documents/1/Pages/1.fpage` and `/Resources/evil.ttf`.
63
89
64
90
## **Shodan**
65
91
66
92
-`pjl port:9100`
67
93
94
+
## References
95
+
-[Hacking printers using fonts (Canon ImageCLASS TrueType VM bugs)](https://haxx.in/posts/2025-09-23-canon-ttf/)
96
+
-[Apple TrueType Reference Manual – Instruction Set and VM (26.6 fixed point)](https://developer.apple.com/fonts/TrueType-Reference-Manual/RM05/Chap5.html)
0 commit comments