This question already has an answer here:
We discovered a vulnerability in wide range of Ricoh printers, where with a simple PostScript file sent directly, it is possible to crash the device.
To recover you need physical access to the printer and an administration account to clear the queue (otherwise, after the restart, the crash will occur again).
This offers a simple and quick denial of service attack. If you are in the right network, you can disable all the printers within seconds.
We tried to contact Ricoh for months (but we were more or less silently ignored) and we finally where able to speak with the responsible person in our country. He stated that he does not see the problem.
Given that we are following the rules of responsible disclosure (Ricoh was warned month ago) and that they clearly stated that they will not address the problem: where should we disclose the problem?
Continue reading Where to disclose a zero day vulnerability [duplicate]→