HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

Critical RCE in Canon imageCLASS MF654Cdw (CVE-2025-14234) Heap Buffer Overflow Allows Remote Code Execution

Canon’s imageCLASS MF654Cdw printer contains a critical heap‑based buffer overflow (CVE‑2025‑14234) that allows unauthenticated remote code execution via the CADM service on TCP 9013. Scored 8.8, the flaw can be weaponized to gain foothold inside corporate networks, posing a supply‑chain risk for organizations that deploy these devices.

🛡️ LiveThreat™ Intelligence · 📅 March 17, 2026· 📰 zerodayinitiative.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
zerodayinitiative.com

Critical RCE in Canon imageCLASS MF654Cdw (CVE-2025-14234) Heap Buffer Overflow Allows Remote Code Execution

What It Is — A heap‑based buffer overflow in the CADM service of Canon’s imageCLASS MF654Cdw multi‑function printer enables unauthenticated attackers to execute arbitrary code on the device.

Exploitability — The vulnerability is publicly disclosed (ZDI‑26‑205) with a CVSS 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). No public PoC is required; a crafted PJCC request to TCP 9013 triggers the overflow, making exploitation trivial for a network‑adjacent adversary.

Affected Products — Canon imageCLASS MF654Cdw network printers (CADM service listening on TCP 9013).

TPRM Impact — Compromised printers can become footholds for lateral movement, data exfiltration, or ransomware across an organization’s network, exposing third‑party risk for any entity that relies on Canon devices.

Recommended Actions — Deploy Canon’s firmware update immediately; isolate printers on a dedicated VLAN; block inbound traffic to port 9013 from untrusted networks; monitor CADM service logs for anomalous requests; verify asset inventory reflects current firmware versions.

Source: Zero Day Initiative Advisory ZDI‑26‑205

📰 Original Source
http://www.zerodayinitiative.com/advisories/ZDI-26-205/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.