As fun as things like that are, AFAIK most of those types of PoC exploits are done using SOHO printers. There are two specific cases I am thinking of, one where a pile of extremely confidential data was captured by pulling documents that had been sent to a printer for printing or faxing; in that case it was an insider who was copying docs they shouldn't have access to. In the other case it was a pretty nifty attack where the attacker was able to pivot using credentials taken from a printer to access other systems.
There are also several publicly available tools that can be used to pop printers, and use them for other bad things, but it's not an area I have spent much time in other than from a blue team/IR perspective. Printers, like alot of other hardware, are usually poorly maintained, but at least patching has mostly gotten easier and most infrastructure scanning tools will report vulnerabilities and weaknesses in them now.