CVE-2025-11541
Unknown Unknown - Not Provided
Stack-Based Buffer Overflow in Sharp Display Projectors Enables Code Execution

Publication date: 2025-12-22

Last updated on: 2025-12-22

Assigner: NEC Corporation

Description
Stack-based Buffer Overflow vulnerability in Sharp Display Solutions projectors allows a attacker may execute arbitrary commands and programs.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-22
Last Modified
2025-12-22
Generated
2026-05-07
AI Q&A
2025-12-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 26 associated CPEs
Vendor Product Version / Range
sharp projector np-p502hl
sharp projector np-p502w+
sharp projector np-p452h
sharp projector np-cr5450wl
sharp projector np-p452w
sharp projector np-p502wl-2
sharp projector np-p502wl+
sharp projector np-p502w
sharp projector np-p452hg
sharp projector np-p502wg
sharp projector np-p502wl
sharp projector np-p452wg
sharp projector np-p502hlg-2
sharp projector np-p502h
sharp projector np-p502hg
sharp projector np-um352w
sharp projector np-um352wg
sharp projector np-p502hl+
sharp projector np-cr5450hl
sharp projector np-p502hl-2
sharp projector np-cr5450h
sharp projector np-p502h+
sharp projector np-cr5450w
sharp projector np-p502wlg
sharp projector np-p502hlg
sharp projector np-um352w+
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

The recommended immediate mitigation is to use the affected Sharp projectors only within a secure intranet protected by a firewall and to avoid connecting them to the Internet, thereby preventing unauthorized access. [1]


Can you explain this vulnerability to me?

This vulnerability is a stack-based buffer overflow in Sharp Display Solutions projectors that allows an attacker to execute arbitrary commands and programs on the affected device. [1]


How can this vulnerability impact me? :

An attacker exploiting this vulnerability could run arbitrary commands and programs on the projector, potentially leading to unauthorized control, data compromise, or disruption of projector functionality. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart