CVE-2025-11545: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Sharp Display Solutions, Ltd. NP-PA1705UL-W, NP-PA1705UL-W+, NP-PA1705UL-B, NP-PA1705UL-B+, NP-PA1505UL-W, NP-PA1505UL-W+, NP-PA1505UL-B, NP-PA1505UL-B+, NP-PA1505UL-BJL NP-PV800UL-W, NP-PV800UL-W+, NP-PV800UL-B, NP-PV800UL-B+, NP-PV710UL-W, NP-PV710UL-W+, NP-PV710UL-B, NP-PV710UL-B+, NP-PV800UL-W1, NP-PV800UL-B1, NP-PV710UL-W1, NP-PV710UL-B1, NP-PV800UL-B1G, NP-PV710UL-B1G, NP-PV800UL-WH, NP-PV710UL-WH, NP-P627UL, NP-P627ULG, NP-P627UL+, NP-P547UL, NP-P547ULG, NP-P607UL+, NP-CG6600UL, NP-H6271UL, NP-H5471UL, NP-P627ULH, NP-P547ULH NP-PV710UL+ NP-PA1004UL-W, NP-PA1004UL-WG, NP-PA1004UL-W+, NP-PA1004UL-WH, NP-PA1004UL-B, NP-PA1004UL-BG, NP-PA1004UL-B+, NP-PA804UL-W, NP-PA804UL-WG, NP-PA804UL-W+, NP-PA804UL-WH, NP-PA804UL-B, NP-PA804UL-BG, NP-PA804UL-B+, NP-PA1004UL-BH, NP-PA804UL-BH, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CG6500XL, NP-CG6400UL, NP-CG6400WL, NP-CB4500XL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME382U, NP-ME382UG, NP-ME402X, NP-ME402XG NP-CU4300XD, NP-CU4200XD, NP-CU4200WD, NP-UM383WL, NP-UM383WLG, NP-CJ2200WD, NP-PH3501QL, NP-PH3501QL+, NP-PH2601QL, NP-PH2601QL+, NP-PH350Q40L, NP-PH260Q30L, NP-PX1005QL-W, NP-PX1005QL-B, NP-PX1005QL-B+, NP-P525UL, NP-P525ULG, NP-P525UL+, NP-P525WL, NP-P525WLG, NP-P525WL+, NP-P605UL, NP-P605ULG, NP-P605UL+
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Sharp Display Solutions projectors allows a attacker may improperly access the HTTP server and execute arbitrary actions.
AI Analysis
Technical Summary
CVE-2025-11545 is a critical security vulnerability classified under CWE-497 (Exposure of Sensitive System Information to an Unauthorized Control Sphere) affecting a wide range of Sharp Display Solutions projectors. The flaw resides in the embedded HTTP server of these devices, which improperly exposes sensitive system information and allows unauthorized attackers to execute arbitrary actions remotely. The vulnerability affects all versions of numerous Sharp projector models, including but not limited to NP-PA1705UL series, NP-PV800UL series, NP-P627UL series, NP-PA1004UL series, NP-PE455UL series, NP-CG6500XL, NP-CB4500XL, NP-CA series, NP-CD series, NP-CR series, NP-MC series, NP-ME series, NP-CU series, NP-UM series, NP-CJ2200WD, NP-PH series, NP-PX1005QL series, NP-P525UL series, and NP-P605UL series. The vulnerability allows attackers to connect to the HTTP server over the network without requiring authentication or user interaction, enabling them to gather sensitive system information and perform arbitrary commands or actions on the device. The CVSS 4.0 score of 9.5 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability was reserved in October 2025 and published in December 2025, with no known exploits in the wild yet. The broad range of affected devices and their deployment in enterprise, educational, and governmental settings make this a significant threat. The exposure of sensitive information could lead to further attacks such as lateral movement, espionage, or disruption of services. The lack of available patches at the time of publication necessitates immediate mitigation through network controls and monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-11545 can be substantial. Sharp projectors are commonly used in corporate boardrooms, educational institutions, government facilities, and conference centers. Unauthorized access to sensitive system information could lead to leakage of internal configurations, network details, or credentials embedded in the devices. Attackers could leverage this information to pivot deeper into organizational networks, conduct espionage, or disrupt critical presentations and communications. The ability to execute arbitrary actions remotely without authentication increases the risk of device manipulation, denial of service, or deployment of malicious payloads. This could interrupt business operations, damage reputations, and cause financial losses. Organizations with strict data protection regulations, such as GDPR in the EU, may face compliance violations if sensitive data is exposed. The vulnerability's ease of exploitation and broad device footprint amplify the threat, especially in environments where network segmentation is weak or where projectors are accessible from less secure network zones. The absence of known exploits currently provides a window for proactive defense, but the critical severity demands urgent attention.
Mitigation Recommendations
1. Immediately restrict network access to the embedded HTTP server on affected Sharp projectors by implementing firewall rules or network segmentation to isolate these devices from untrusted or public networks. 2. Disable the HTTP server functionality on the projectors if it is not essential for operations. 3. Monitor network traffic to and from projector devices for unusual or unauthorized access attempts, using intrusion detection systems or network monitoring tools. 4. Apply any vendor-released patches or firmware updates as soon as they become available; maintain close communication with Sharp Display Solutions for updates. 5. Conduct an inventory of all Sharp projector models in use to identify and prioritize vulnerable devices for mitigation. 6. Implement strict access controls and authentication mechanisms where possible to limit administrative access to projector management interfaces. 7. Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving projector compromise. 8. Consider deploying network anomaly detection solutions that can identify exploitation attempts targeting IoT or embedded devices. 9. For critical environments, evaluate alternative hardware or additional protective layers such as VPNs or jump hosts to access projector management interfaces securely. 10. Document and audit all mitigation steps to ensure compliance and readiness for potential audits or investigations.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Switzerland, Poland
CVE-2025-11545: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Sharp Display Solutions, Ltd. NP-PA1705UL-W, NP-PA1705UL-W+, NP-PA1705UL-B, NP-PA1705UL-B+, NP-PA1505UL-W, NP-PA1505UL-W+, NP-PA1505UL-B, NP-PA1505UL-B+, NP-PA1505UL-BJL NP-PV800UL-W, NP-PV800UL-W+, NP-PV800UL-B, NP-PV800UL-B+, NP-PV710UL-W, NP-PV710UL-W+, NP-PV710UL-B, NP-PV710UL-B+, NP-PV800UL-W1, NP-PV800UL-B1, NP-PV710UL-W1, NP-PV710UL-B1, NP-PV800UL-B1G, NP-PV710UL-B1G, NP-PV800UL-WH, NP-PV710UL-WH, NP-P627UL, NP-P627ULG, NP-P627UL+, NP-P547UL, NP-P547ULG, NP-P607UL+, NP-CG6600UL, NP-H6271UL, NP-H5471UL, NP-P627ULH, NP-P547ULH NP-PV710UL+ NP-PA1004UL-W, NP-PA1004UL-WG, NP-PA1004UL-W+, NP-PA1004UL-WH, NP-PA1004UL-B, NP-PA1004UL-BG, NP-PA1004UL-B+, NP-PA804UL-W, NP-PA804UL-WG, NP-PA804UL-W+, NP-PA804UL-WH, NP-PA804UL-B, NP-PA804UL-BG, NP-PA804UL-B+, NP-PA1004UL-BH, NP-PA804UL-BH, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CG6500XL, NP-CG6400UL, NP-CG6400WL, NP-CB4500XL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME382U, NP-ME382UG, NP-ME402X, NP-ME402XG NP-CU4300XD, NP-CU4200XD, NP-CU4200WD, NP-UM383WL, NP-UM383WLG, NP-CJ2200WD, NP-PH3501QL, NP-PH3501QL+, NP-PH2601QL, NP-PH2601QL+, NP-PH350Q40L, NP-PH260Q30L, NP-PX1005QL-W, NP-PX1005QL-B, NP-PX1005QL-B+, NP-P525UL, NP-P525ULG, NP-P525UL+, NP-P525WL, NP-P525WLG, NP-P525WL+, NP-P605UL, NP-P605ULG, NP-P605UL+
Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Sharp Display Solutions projectors allows a attacker may improperly access the HTTP server and execute arbitrary actions.
AI-Powered Analysis
Technical Analysis
CVE-2025-11545 is a critical security vulnerability classified under CWE-497 (Exposure of Sensitive System Information to an Unauthorized Control Sphere) affecting a wide range of Sharp Display Solutions projectors. The flaw resides in the embedded HTTP server of these devices, which improperly exposes sensitive system information and allows unauthorized attackers to execute arbitrary actions remotely. The vulnerability affects all versions of numerous Sharp projector models, including but not limited to NP-PA1705UL series, NP-PV800UL series, NP-P627UL series, NP-PA1004UL series, NP-PE455UL series, NP-CG6500XL, NP-CB4500XL, NP-CA series, NP-CD series, NP-CR series, NP-MC series, NP-ME series, NP-CU series, NP-UM series, NP-CJ2200WD, NP-PH series, NP-PX1005QL series, NP-P525UL series, and NP-P605UL series. The vulnerability allows attackers to connect to the HTTP server over the network without requiring authentication or user interaction, enabling them to gather sensitive system information and perform arbitrary commands or actions on the device. The CVSS 4.0 score of 9.5 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability was reserved in October 2025 and published in December 2025, with no known exploits in the wild yet. The broad range of affected devices and their deployment in enterprise, educational, and governmental settings make this a significant threat. The exposure of sensitive information could lead to further attacks such as lateral movement, espionage, or disruption of services. The lack of available patches at the time of publication necessitates immediate mitigation through network controls and monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-11545 can be substantial. Sharp projectors are commonly used in corporate boardrooms, educational institutions, government facilities, and conference centers. Unauthorized access to sensitive system information could lead to leakage of internal configurations, network details, or credentials embedded in the devices. Attackers could leverage this information to pivot deeper into organizational networks, conduct espionage, or disrupt critical presentations and communications. The ability to execute arbitrary actions remotely without authentication increases the risk of device manipulation, denial of service, or deployment of malicious payloads. This could interrupt business operations, damage reputations, and cause financial losses. Organizations with strict data protection regulations, such as GDPR in the EU, may face compliance violations if sensitive data is exposed. The vulnerability's ease of exploitation and broad device footprint amplify the threat, especially in environments where network segmentation is weak or where projectors are accessible from less secure network zones. The absence of known exploits currently provides a window for proactive defense, but the critical severity demands urgent attention.
Mitigation Recommendations
1. Immediately restrict network access to the embedded HTTP server on affected Sharp projectors by implementing firewall rules or network segmentation to isolate these devices from untrusted or public networks. 2. Disable the HTTP server functionality on the projectors if it is not essential for operations. 3. Monitor network traffic to and from projector devices for unusual or unauthorized access attempts, using intrusion detection systems or network monitoring tools. 4. Apply any vendor-released patches or firmware updates as soon as they become available; maintain close communication with Sharp Display Solutions for updates. 5. Conduct an inventory of all Sharp projector models in use to identify and prioritize vulnerable devices for mitigation. 6. Implement strict access controls and authentication mechanisms where possible to limit administrative access to projector management interfaces. 7. Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving projector compromise. 8. Consider deploying network anomaly detection solutions that can identify exploitation attempts targeting IoT or embedded devices. 9. For critical environments, evaluate alternative hardware or additional protective layers such as VPNs or jump hosts to access projector management interfaces securely. 10. Document and audit all mitigation steps to ensure compliance and readiness for potential audits or investigations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- NEC
- Date Reserved
- 2025-10-09T06:46:44.715Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6948d6e9f380eec6876e960d
Added to database: 12/22/2025, 5:28:09 AM
Last enriched: 12/22/2025, 5:43:19 AM
Last updated: 12/22/2025, 7:49:33 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15014: SQL Injection in loganhong php loganSite
MediumCVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01
CriticalCVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
CriticalCVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
HighCVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.