https://barcode.tec-it.com/barcode.ashx?data=Robert%27)%3B+D...
The vulnerabilities outlined here are:
1) the barcode reader itself is configured over the untrusted channel via specific barcodes, instead of out-of-band via the USB interface
2) the barcode reader is either already emulating a keyboard, or can be configured to do so via the (untrusted) configuration mechanism described above.
This vulnerability can be mitigated by making sure the barcode scanner can't be reconfigured in the field and by talking to the barcode scanner over a specific interface (serial) instead of keyboard emulation, so that data from the barcode scanner has no chance of being interpreted by the OS as keyboard input.
or even deeper https://conservancy.umn.edu/bitstream/handle/11299/175329/Sc...
https://www.abr.com/wp-content/uploads/2014/04/barcode-basic...