Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://whitelabel.org/security/2026-02-01-smart-projector/ |
|
Sat, 09 May 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unsecured Local Network API Enables Remote Control of Optoma CinemaX P2 Projector |
Sat, 09 May 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated Remote Control via HTTP API on Optoma CinemaX P2 Projector | |
| Weaknesses | CWE-284 |
Fri, 08 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
cvssV3_1
|
Thu, 07 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Optoma
Optoma cinemax P2 |
|
| Vendors & Products |
Optoma
Optoma cinemax P2 |
Thu, 07 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated Remote Control via HTTP API on Optoma CinemaX P2 Projector | |
| Weaknesses | CWE-284 |
Thu, 07 May 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Optoma CinemaX P2 projector (firmware TVOS-04.24.010.04.01, Android 8.0.0) exposes an HTTP API on TCP port 2345 that allows full unauthenticated remote control of the device. The API supports both reading configuration (74 endpoints) and writing/modifying settings including volume, mute, brightness, power, network protocols enable/disable (including TELNET), display modes, and other projector functions. Any device on the same network can control the projector without authentication. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-08T22:04:24.009Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-30496
Updated: 2026-05-08T21:57:03.851Z
Status : Awaiting Analysis
Published: 2026-05-07T14:16:02.097
Modified: 2026-05-08T23:16:34.893
Link: CVE-2026-30496
No data.
OpenCVE Enrichment
Updated: 2026-05-09T01:30:16Z