Skip to main content

CVE-2025-6532: Improper Access Controls in NOYAFA LF9 Pro

Medium
VulnerabilityCVE-2025-6532cvecve-2025-6532
Published: Tue Jun 24 2025 (06/24/2025, 00:00:08 UTC)
Source: CVE Database V5
Vendor/Project: NOYAFA
Product: LF9 Pro

Description

A vulnerability classified as problematic was found in NOYAFA/Xiami LF9 Pro up to 20250611. Affected by this vulnerability is an unknown functionality of the component RTSP Live Video Stream Endpoint. The manipulation leads to improper access controls. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. This dashcam is distributed by multiple resellers and different names.

AI-Powered Analysis

AILast updated: 06/24/2025, 00:25:00 UTC

Technical Analysis

CVE-2025-6532 is a medium-severity vulnerability affecting the NOYAFA LF9 Pro dashcam, specifically targeting an unknown functionality within the RTSP (Real Time Streaming Protocol) Live Video Stream Endpoint component. The vulnerability arises from improper access controls, allowing an attacker within the local network to potentially manipulate or access the video stream or related functionalities without proper authorization. The flaw does not require any authentication or user interaction, and the attack vector is limited to local network access, meaning remote exploitation over the internet is not feasible without prior network access. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality (VC:L) with no impact on integrity or availability. The vulnerability was publicly disclosed on June 24, 2025, and while no known exploits are currently observed in the wild, the public disclosure increases the risk of exploitation by local attackers. The dashcam is distributed under multiple reseller brands, which may complicate patch deployment and vulnerability management. No patches or mitigation links have been provided at the time of disclosure.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to privacy and confidentiality risks. Dashcams like the NOYAFA LF9 Pro are often used in fleet management, logistics, transportation services, and by private individuals. Unauthorized access to live video streams could lead to exposure of sensitive operational details, vehicle locations, or personal data, potentially violating GDPR regulations. While the vulnerability does not affect system integrity or availability, the confidentiality breach could be exploited for corporate espionage, stalking, or other malicious activities. The local network attack vector limits the threat to environments where the attacker has physical or network proximity, such as compromised internal networks, guest Wi-Fi, or insider threats. Organizations with large vehicle fleets or those relying on these dashcams for security and monitoring should be particularly cautious, as attackers could leverage this vulnerability to gain unauthorized surveillance capabilities.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement network segmentation to isolate dashcams from general corporate networks, restricting access to trusted devices only. Deploy VLANs or dedicated subnets for IoT and vehicle devices, enforcing strict firewall rules to block unauthorized local network access to RTSP endpoints. Regularly audit network traffic for unusual RTSP connection attempts. Where possible, disable RTSP streaming if not required or replace devices with models that have verified secure access controls. Additionally, enforce strong Wi-Fi security protocols (WPA3 preferred) to prevent unauthorized local network access. Organizations should engage with NOYAFA or resellers to obtain firmware updates or security advisories. Finally, educate staff about the risks of connecting unknown devices to internal networks and monitor for insider threats that could exploit local network access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-23T14:21:33.110Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6859ecc2dec26fc862d8b656

Added to database: 6/24/2025, 12:09:38 AM

Last enriched: 6/24/2025, 12:25:00 AM

Last updated: 6/24/2025, 12:25:00 AM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats