hi, The NASHUATEC D445 printer is vulnerabled to many attacks. There are 4 communs services that run in a standard configuration: httpd, ftpd, telnetd, printer. (tested with nmap) I discovered last day, at least three differents ways to attack this kind of boxes. First, it's possible to configure remotly the server via its own admin web server (port 80). Naturaly the server 'll ask u for an admin password before submiting the form to the cgi. The password field is 15 chars length but an intruder with a lightly modified copy of the original form 'll be able to submit many more chars ( about 260 will be enough for the test ) to the cgi and produce a buffer overflow.( see the example below ) The cgi concerned is "reset" but i suppose, every cgi are exposed to this problem. If our intruder decide to forge a special password with instruction code inside he'll force the remote printer to execute code with the target web server priviledge. I don't have, now, all the required informations to gain server priviledge but u may find it here very soon :) Attacker form example: