Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11943: Use of Default Credentials in 70mai X200

0
Medium
VulnerabilityCVE-2025-11943cvecve-2025-11943
Published: Sun Oct 19 2025 (10/19/2025, 19:32:05 UTC)
Source: CVE Database V5
Vendor/Project: 70mai
Product: X200

Description

A vulnerability has been found in 70mai X200 up to 20251010. Affected by this vulnerability is an unknown functionality of the component HTTP Web Server. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/19/2025, 19:51:56 UTC

Technical Analysis

CVE-2025-11943 identifies a security weakness in the 70mai X200 device, specifically within an HTTP web server component that uses default credentials. The affected versions include firmware up to 20251010. The vulnerability arises because the device ships or operates with default login credentials that have not been changed or enforced to be changed by the user. This allows an unauthenticated remote attacker to access the device's web interface and potentially manipulate device settings or extract sensitive information. The attack vector requires no user interaction and no privileges, making it straightforward to exploit over the network. The CVSS 4.0 base score is 6.9 (medium), reflecting the ease of remote exploitation and the impact on confidentiality, integrity, and availability, though the impact is limited by the scope of the device’s functionality. The vendor was notified early but has not issued any patches or advisories, and no known exploits are currently active in the wild. The vulnerability is significant because 70mai X200 devices are commonly used as dashcams in vehicles, often connected to corporate or personal networks, potentially exposing internal systems if compromised. The lack of patch availability and vendor response increases the risk profile for users. Organizations relying on these devices should consider immediate mitigations to prevent unauthorized access.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to vehicle dashcams, potentially exposing sensitive video footage, location data, or device configuration. This could compromise privacy and operational security, especially for companies managing fleets or transportation services. Attackers might leverage compromised devices as footholds into broader corporate networks if these devices are connected internally. The integrity of recorded data could be undermined, affecting evidence or monitoring capabilities. Availability could also be impacted if attackers disrupt device functionality. Given the remote exploitability without authentication, the risk of widespread abuse exists if attackers scan for vulnerable devices. The absence of vendor patches means organizations must rely on compensating controls. The impact is particularly relevant for sectors like logistics, public transportation, and law enforcement agencies using 70mai X200 devices in Europe.

Mitigation Recommendations

Since no official patches are available, organizations should immediately change default credentials on all 70mai X200 devices to strong, unique passwords. Network segmentation should be enforced to isolate these devices from critical internal systems, limiting their network exposure. Disable or restrict access to the HTTP web server interface where possible, using firewall rules or VPNs to control remote access. Monitor network traffic for unusual connections to or from these devices. Consider deploying intrusion detection systems to alert on suspicious activity targeting the devices. If feasible, replace or upgrade devices to models with confirmed secure firmware. Maintain an inventory of all 70mai X200 devices to ensure comprehensive coverage of mitigation efforts. Engage with the vendor for updates and monitor security advisories for future patches. Educate users and administrators about the risks of default credentials and the importance of secure configuration.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-19T02:39:10.333Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f540b8b572bcaa2b43c10d

Added to database: 10/19/2025, 7:49:12 PM

Last enriched: 10/19/2025, 7:51:56 PM

Last updated: 10/20/2025, 11:53:15 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats