CVE-2025-11542
Published: 22 December 2025
Description
Stack-based Buffer Overflow vulnerability in Sharp Display Solutions projectors allows a attacker may execute arbitrary commands and programs.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the stack-based buffer overflow by requiring timely application of vendor patches from the Sharp support advisory.
Prevents exploitation of the buffer overflow vulnerability by enforcing validation of network inputs to avoid stack corruption.
Mitigates remote code execution from the stack buffer overflow using memory protections like stack canaries and non-executable stacks.
Security SummaryAI
CVE-2025-11542 is a stack-based buffer overflow vulnerability, associated with CWE-121 and CWE-787, affecting Sharp Display Solutions projectors. Published on 2025-12-22, it enables an attacker to execute arbitrary commands and programs. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its high potential impact.
The vulnerability can be exploited remotely over the network by any unauthenticated attacker with low complexity and no need for user interaction. Successful exploitation allows full remote code execution, compromising confidentiality, integrity, and availability with high impact, potentially leading to complete control over the affected projector.
Sharp has issued a support advisory for this vulnerability at https://sharp-displays.jp.sharp/global/support/info/PJ-CVE-2025-11540.html.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows unauthenticated remote code execution via a stack-based buffer overflow over the network on a public-facing projector service, directly mapping to exploitation of public-facing applications.