The Optoma CinemaX P2 projector (firmware TVOS-04.24.010.04.01, Android 8.0.0) exposes Android Debug Bridge (ADB) on TCP port 5555 over the network without requiring authentication. The device is configured with ro.adb.secure=0, which disables RSA key verification. Additionally, a functional su binary exists at /system/xbin/su that grants root privileges without authentication. An attacker on the same network can connect to the device via ADB, obtain a shell, and escalate to root privileges, gaining complete control of the device. This allows extraction of stored WiFi credentials, installation of persistent malware, and access to all device data.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://whitelabel.org/security/2026-02-01-smart-projector/ |
|
History
Sat, 09 May 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated ADB Access with Root Privilege Escalation in Optoma CinemaX P2 Projector |
Sat, 09 May 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated ADB Exposure and Root Access on Optoma CinemaX P2 Projector | |
| Weaknesses | CWE-284 |
Fri, 08 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
cvssV3_1
|
Thu, 07 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Optoma
Optoma cinemax P2 |
|
| Vendors & Products |
Optoma
Optoma cinemax P2 |
Thu, 07 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated ADB Exposure and Root Access on Optoma CinemaX P2 Projector | |
| Weaknesses | CWE-284 |
Thu, 07 May 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Optoma CinemaX P2 projector (firmware TVOS-04.24.010.04.01, Android 8.0.0) exposes Android Debug Bridge (ADB) on TCP port 5555 over the network without requiring authentication. The device is configured with ro.adb.secure=0, which disables RSA key verification. Additionally, a functional su binary exists at /system/xbin/su that grants root privileges without authentication. An attacker on the same network can connect to the device via ADB, obtain a shell, and escalate to root privileges, gaining complete control of the device. This allows extraction of stored WiFi credentials, installation of persistent malware, and access to all device data. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-05-07T00:00:00.000Z
Updated: 2026-05-08T22:02:49.050Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-30495
Updated: 2026-05-08T21:53:16.051Z
Status : Awaiting Analysis
Published: 2026-05-07T14:16:01.983
Modified: 2026-05-08T23:16:34.750
Link: CVE-2026-30495
No data.
ReportizFlow