Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12915: File Inclusion in 70mai X200

0
High
VulnerabilityCVE-2025-12915cvecve-2025-12915
Published: Sat Nov 08 2025 (11/08/2025, 23:02:06 UTC)
Source: CVE Database V5
Vendor/Project: 70mai
Product: X200

Description

A vulnerability was found in 70mai X200 up to 20251019. This issue affects some unknown processing of the component Init Script Handler. The manipulation results in file inclusion. The attack requires a local approach. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/15/2025, 23:54:47 UTC

Technical Analysis

CVE-2025-12915 is a file inclusion vulnerability identified in the 70mai X200 device firmware up to version 20251019. The vulnerability stems from insecure processing within the Init Script Handler component, which improperly handles file references, enabling an attacker to include arbitrary files on the device. This can lead to unauthorized disclosure or modification of sensitive files, potentially compromising device integrity and confidentiality. Exploitation requires local access with high privileges, indicating that an attacker must already have significant control or physical access to the device. The attack complexity is high, meaning it is difficult to execute successfully. No user interaction is needed, and the vulnerability does not require network access, limiting remote exploitation. The CVSS 4.0 base score is 7.1, reflecting high severity due to the impact on confidentiality, integrity, and availability, combined with the difficulty of exploitation. Although an exploit has been publicly disclosed, there are no reports of active exploitation in the wild. The vendor 70mai has not responded to early disclosure attempts, and no patches are currently available. This vulnerability primarily affects environments where the 70mai X200 device is deployed, such as automotive dashcams or fleet management systems, where local attackers could leverage this flaw to escalate privileges or manipulate device behavior.

Potential Impact

For European organizations, especially those in automotive, logistics, and fleet management sectors using 70mai X200 devices, this vulnerability poses significant risks. Successful exploitation could lead to unauthorized access to sensitive data stored on the device, manipulation of device configurations, or disruption of device functionality, impacting operational integrity. Confidentiality breaches could expose location data or recorded footage, raising privacy concerns under GDPR. Integrity compromises might allow attackers to alter logs or disable security features, undermining trust in device data. Availability impacts are less likely but possible if the device is rendered inoperable. The requirement for local high-privilege access limits the threat to insiders or attackers with physical access, but insider threats or compromised endpoints could exploit this. The lack of vendor response and patches increases exposure duration, necessitating proactive defensive measures. Organizations relying on these devices should consider the potential for targeted attacks, especially in high-value or sensitive operational contexts.

Mitigation Recommendations

1. Restrict physical and local access to 70mai X200 devices to trusted personnel only, employing strict access controls and monitoring. 2. Implement network segmentation to isolate devices and limit lateral movement if local access is gained. 3. Monitor device logs and behavior for anomalies indicative of exploitation attempts, such as unexpected file access or script executions. 4. Employ endpoint security solutions on connected systems to detect and prevent privilege escalation or unauthorized local access. 5. Engage with 70mai or authorized vendors to obtain firmware updates or patches as soon as they become available. 6. If patching is not immediately possible, consider disabling or restricting the Init Script Handler component if feasible, or deploying compensating controls such as application whitelisting. 7. Conduct regular security audits and penetration tests focusing on local access vectors to identify and remediate weaknesses. 8. Educate staff on the risks of local device tampering and enforce policies to prevent unauthorized device use or modification.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-08T07:22:26.227Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690fcfd8932891ff16e907d3

Added to database: 11/8/2025, 11:18:48 PM

Last enriched: 11/15/2025, 11:54:47 PM

Last updated: 12/22/2025, 2:35:21 PM

Views: 136

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats