CVE-2026-30496
Awaiting Analysis Awaiting Analysis - Queue
Unauthenticated Remote Control in Optoma CinemaX P2 Projector

Publication date: 2026-05-07

Last updated on: 2026-05-07

Assigner: MITRE

Description
The Optoma CinemaX P2 projector (firmware TVOS-04.24.010.04.01, Android 8.0.0) exposes an HTTP API on TCP port 2345 that allows full unauthenticated remote control of the device. The API supports both reading configuration (74 endpoints) and writing/modifying settings including volume, mute, brightness, power, network protocols enable/disable (including TELNET), display modes, and other projector functions. Any device on the same network can control the projector without authentication.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-07
Last Modified
2026-05-07
Generated
2026-05-07
AI Q&A
2026-05-07
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
optoma cinemax_p2 From 8.0.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability allows an attacker on the same network to take full control of the projector remotely without authentication.

An attacker could change settings such as volume, brightness, power state, and network configurations, potentially disrupting presentations or other uses of the projector.

Additionally, enabling or disabling network protocols like TELNET could open further attack vectors or expose the device to additional compromise.

Users are advised to disconnect the device from shared networks or isolate it on a separate network to reduce the risk of exploitation.


Can you explain this vulnerability to me?

The Optoma CinemaX P2 projector, running firmware TVOS-04.24.010.04.01 on Android 8.0.0, exposes an HTTP API on TCP port 2345 that allows full remote control of the device without requiring any authentication.

This API includes 74 endpoints that enable both reading the projector's configuration and modifying various settings such as volume, mute, brightness, power, network protocols (including enabling or disabling TELNET), display modes, and other projector functions.

Any device on the same network can access and control the projector remotely without needing credentials, making it vulnerable to unauthorized use.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in the Optoma CinemaX P2 projector allows unauthenticated remote control of the device by any device on the same network, potentially exposing sensitive device settings and functions.

Such unauthorized access could lead to violations of common standards and regulations like GDPR and HIPAA, which require protection of sensitive data and secure device management to prevent unauthorized access and data breaches.

Since the vulnerability enables full control without authentication, it increases the risk of unauthorized data exposure or manipulation, which could compromise compliance with these regulations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves an HTTP API exposed on TCP port 2345 that allows unauthenticated remote control of the Optoma CinemaX P2 projector.

To detect this vulnerability on your network or system, you can scan for devices with TCP port 2345 open and check if the projector's API is accessible without authentication.

  • Use a network scanning tool like nmap to detect open port 2345: nmap -p 2345 <target-ip>
  • Attempt to access the HTTP API on port 2345 using curl or a web browser: curl http://<target-ip>:2345/
  • Check if you can retrieve or modify settings without authentication by sending HTTP requests to known endpoints.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disconnecting the projector from the network to prevent unauthorized access.

If possible, manually apply any available patches or firmware updates, although the vendor has not fully resolved this issue.

Isolate the projector on a separate network segment to limit exposure to other devices.

Disable or restrict access to TCP port 2345 on your network firewall to block unauthorized API access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart