An unauthenticated attacker may perform a blind server side request forgery (SSRF), due to a CLRF injection issue that can be leveraged to perform HTTP request smuggling. This SSRF leverages the WS-Addressing feature used during a WS-Eventing subscription SOAP operation. The attacker can control all the HTTP data sent in the SSRF connection, but the attacker can not receive any data back from this connection.
https://www.toshibatec.com/information/20250625_02.html
https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000007
https://www.konicaminolta.com/global-en/security/advisory/pdf/km-2025-0001.pdf
https://www.fujifilm.com/fbglobal/eng/company/news/notice/2025/0625_announce.html
https://support.brother.com/g/b/link.aspx?prod=lmgroup1&faqid=faqp00100620_000
https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100848_000
https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100846_000