Skip to main content

CVE-2025-30133: n/a

Critical
VulnerabilityCVE-2025-30133cvecve-2025-30133
Published: Mon Jul 28 2025 (07/28/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered on IROAD Dashcam FX2 devices. Bypass of Device Pairing/Registration can occur. It requires device registration via the "IROAD X View" app for authentication, but its HTTP server lacks this restriction. Once connected to the dashcam's Wi-Fi network via the default password ("qwertyuiop"), an attacker can directly access the HTTP server at http://192.168.10.1 without undergoing the pairing process. Additionally, no alert is triggered on the device when an attacker connects, making this intrusion completely silent.

AI-Powered Analysis

AILast updated: 08/05/2025, 00:56:08 UTC

Technical Analysis

CVE-2025-30133 is a critical security vulnerability affecting IROAD Dashcam FX2 devices. The core issue lies in the device's HTTP server implementation, which fails to enforce the expected authentication and pairing restrictions. Normally, device access requires registration and pairing through the "IROAD X View" app, which authenticates users before granting control. However, the dashcam's embedded HTTP server is accessible directly over its Wi-Fi network using a default password "qwertyuiop" without any pairing or authentication checks. This allows an attacker who connects to the dashcam's Wi-Fi network to bypass the registration process entirely and gain full access to the device's HTTP interface. Furthermore, the device does not generate any alerts or notifications when an unauthorized connection occurs, making the intrusion silent and difficult to detect. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the device fails to properly restrict access to its management interface. The CVSS v3.1 base score is 9.8 (critical), reflecting the vulnerability's ease of exploitation (no privileges or user interaction required), network attack vector, and high impact on confidentiality, integrity, and availability. An attacker could potentially manipulate dashcam settings, extract sensitive data such as recorded footage, or disrupt device functionality. No patches or fixes have been published yet, and no known exploits are reported in the wild as of now.

Potential Impact

For European organizations, especially those relying on IROAD Dashcam FX2 devices in fleet management, logistics, or security operations, this vulnerability poses significant risks. Unauthorized access to dashcams could lead to leakage of sensitive video footage, compromising privacy and potentially exposing confidential operational details. Attackers could manipulate device settings or disable recording, undermining the integrity and availability of critical surveillance data. This could affect insurance claims, legal evidence, and operational safety. The silent nature of the intrusion increases the risk of prolonged undetected exploitation. Organizations using these devices in vehicles operating in urban or sensitive environments may face increased exposure to espionage, data theft, or sabotage. Additionally, compromised dashcams could be leveraged as pivot points within corporate networks if connected to broader IT infrastructure, amplifying the threat.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately change the default Wi-Fi password on all IROAD Dashcam FX2 devices to a strong, unique passphrase to prevent unauthorized network access. Network segmentation is critical: isolate dashcam Wi-Fi networks from corporate and sensitive networks to limit attacker lateral movement. Disable or restrict Wi-Fi access when devices are not in use. Monitor network traffic for unusual connections to the dashcam's IP address (192.168.10.1) and implement intrusion detection systems capable of alerting on unauthorized access attempts. Since no official patches are available, organizations should engage with the vendor for firmware updates and apply them promptly once released. Consider deploying endpoint security solutions on connected devices to detect anomalous behavior. For high-security environments, temporarily discontinue use of vulnerable dashcams until a fix is available or replace them with devices that enforce robust authentication. Finally, educate users and administrators about the risks of default credentials and the importance of secure device configuration.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 688782fead5a09ad00842474

Added to database: 7/28/2025, 2:02:38 PM

Last enriched: 8/5/2025, 12:56:08 AM

Last updated: 9/9/2025, 8:00:22 AM

Views: 30

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats