JVN#45776251
Multiple vulnerabilities in multiple Sharp Display Solutions Projectors
Overview
Multiple projectors provided by Sharp Display Solutions contain multiple vulnerabilities.
Products Affected
A wide range of products are affected.
As for the details of affected product names and model numbers, refer to the information provided by the vendor in [Vendor Status].
Description
Multiple projectors provided by Sharp Display Solutions contain multiple vulnerabilities listed below.
- Path traversal (CWE-22, CVE-2025-11540)
- Stack-based buffer overflow (CWE-121, CVE-2025-11541, CVE-2025-11542)
- Improper validation of integrity check value (CWE-354, CVE-2025-11543)
- Hidden functionality (CWE-912, CVE-2025-11544)
- Exposure of sensitive system information to an unauthorized control sphere (CWE-497, CVE-2025-11545)
Impact
- An attacker may obtain any files within the projector (CVE-2025-11540)
- An attacker may execute arbitrary commands and programs (CVE-2025-11541, CVE-2025-11542)
- An attacker may run an unauthorized firmware (CVE-2025-11543)
- An attacker may obtain network connection information (CVE-2025-11544)
- An attacker may execute arbitrary actions on the projector (CVE-2025-11545)
Solution
Apply the Workaround
The developer has provided workarounds for all affected products. Apply the workarounds according to the information provided by the developer.
Update the firmware
The developer has provided the updated firmware versions addressing these vulnerabilities for some of the affected products. Update the firmware to the latest version according to the information provided by the developer.
For more information, refer to the information provided by the developer.
Vendor Status
| Vendor | Link |
| Sharp Display Solutions, Ltd. | Multiple vulnerabilities in projectors |
| Vulnerabilities allowing unauthorized information retrieval in projectors | |
| Vulnerabilities allowing unauthorized operations in projectors |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Sebastian Pahl of the University of Luxembourg reported these vulnerabilities to the developer and coordinated. After the coordination was completed, the developer reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
| JPCERT Alert |
|
| JPCERT Reports |
|
| CERT Advisory |
|
| CPNI Advisory |
|
| TRnotes |
|
| CVE |
|
| JVN iPedia |
JVNDB-2026-000002 |