CVE-2025-6532: Improper Access Controls in NOYAFA LF9 Pro
A vulnerability classified as problematic was found in NOYAFA/Xiami LF9 Pro up to 20250611. Affected by this vulnerability is an unknown functionality of the component RTSP Live Video Stream Endpoint. The manipulation leads to improper access controls. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. This dashcam is distributed by multiple resellers and different names.
AI Analysis
Technical Summary
CVE-2025-6532 is a medium-severity vulnerability affecting the NOYAFA LF9 Pro dashcam, specifically targeting an unknown functionality within the RTSP (Real Time Streaming Protocol) Live Video Stream Endpoint component. The vulnerability arises from improper access controls, allowing an attacker within the local network to potentially manipulate or access the video stream or related functionalities without proper authorization. The flaw does not require any authentication or user interaction, and the attack vector is limited to local network access, meaning remote exploitation over the internet is not feasible without prior network access. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality (VC:L) with no impact on integrity or availability. The vulnerability was publicly disclosed on June 24, 2025, and while no known exploits are currently observed in the wild, the public disclosure increases the risk of exploitation by local attackers. The dashcam is distributed under multiple reseller brands, which may complicate patch deployment and vulnerability management. No patches or mitigation links have been provided at the time of disclosure.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to privacy and confidentiality risks. Dashcams like the NOYAFA LF9 Pro are often used in fleet management, logistics, transportation services, and by private individuals. Unauthorized access to live video streams could lead to exposure of sensitive operational details, vehicle locations, or personal data, potentially violating GDPR regulations. While the vulnerability does not affect system integrity or availability, the confidentiality breach could be exploited for corporate espionage, stalking, or other malicious activities. The local network attack vector limits the threat to environments where the attacker has physical or network proximity, such as compromised internal networks, guest Wi-Fi, or insider threats. Organizations with large vehicle fleets or those relying on these dashcams for security and monitoring should be particularly cautious, as attackers could leverage this vulnerability to gain unauthorized surveillance capabilities.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement network segmentation to isolate dashcams from general corporate networks, restricting access to trusted devices only. Deploy VLANs or dedicated subnets for IoT and vehicle devices, enforcing strict firewall rules to block unauthorized local network access to RTSP endpoints. Regularly audit network traffic for unusual RTSP connection attempts. Where possible, disable RTSP streaming if not required or replace devices with models that have verified secure access controls. Additionally, enforce strong Wi-Fi security protocols (WPA3 preferred) to prevent unauthorized local network access. Organizations should engage with NOYAFA or resellers to obtain firmware updates or security advisories. Finally, educate staff about the risks of connecting unknown devices to internal networks and monitor for insider threats that could exploit local network access.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-6532: Improper Access Controls in NOYAFA LF9 Pro
Description
A vulnerability classified as problematic was found in NOYAFA/Xiami LF9 Pro up to 20250611. Affected by this vulnerability is an unknown functionality of the component RTSP Live Video Stream Endpoint. The manipulation leads to improper access controls. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. This dashcam is distributed by multiple resellers and different names.
AI-Powered Analysis
Technical Analysis
CVE-2025-6532 is a medium-severity vulnerability affecting the NOYAFA LF9 Pro dashcam, specifically targeting an unknown functionality within the RTSP (Real Time Streaming Protocol) Live Video Stream Endpoint component. The vulnerability arises from improper access controls, allowing an attacker within the local network to potentially manipulate or access the video stream or related functionalities without proper authorization. The flaw does not require any authentication or user interaction, and the attack vector is limited to local network access, meaning remote exploitation over the internet is not feasible without prior network access. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality (VC:L) with no impact on integrity or availability. The vulnerability was publicly disclosed on June 24, 2025, and while no known exploits are currently observed in the wild, the public disclosure increases the risk of exploitation by local attackers. The dashcam is distributed under multiple reseller brands, which may complicate patch deployment and vulnerability management. No patches or mitigation links have been provided at the time of disclosure.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to privacy and confidentiality risks. Dashcams like the NOYAFA LF9 Pro are often used in fleet management, logistics, transportation services, and by private individuals. Unauthorized access to live video streams could lead to exposure of sensitive operational details, vehicle locations, or personal data, potentially violating GDPR regulations. While the vulnerability does not affect system integrity or availability, the confidentiality breach could be exploited for corporate espionage, stalking, or other malicious activities. The local network attack vector limits the threat to environments where the attacker has physical or network proximity, such as compromised internal networks, guest Wi-Fi, or insider threats. Organizations with large vehicle fleets or those relying on these dashcams for security and monitoring should be particularly cautious, as attackers could leverage this vulnerability to gain unauthorized surveillance capabilities.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement network segmentation to isolate dashcams from general corporate networks, restricting access to trusted devices only. Deploy VLANs or dedicated subnets for IoT and vehicle devices, enforcing strict firewall rules to block unauthorized local network access to RTSP endpoints. Regularly audit network traffic for unusual RTSP connection attempts. Where possible, disable RTSP streaming if not required or replace devices with models that have verified secure access controls. Additionally, enforce strong Wi-Fi security protocols (WPA3 preferred) to prevent unauthorized local network access. Organizations should engage with NOYAFA or resellers to obtain firmware updates or security advisories. Finally, educate staff about the risks of connecting unknown devices to internal networks and monitor for insider threats that could exploit local network access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-23T14:21:33.110Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6859ecc2dec26fc862d8b656
Added to database: 6/24/2025, 12:09:38 AM
Last enriched: 6/24/2025, 12:25:00 AM
Last updated: 6/24/2025, 12:25:00 AM
Views: 1
Related Threats
CVE-2025-6534: Improper Control of Resource Identifiers in xxyopen novel-plus
LowCVE-2025-6533: Authentication Bypass by Capture-replay in xxyopen novel-plus
MediumCVE-2025-6531: Improper Access Controls in SIFUSM BD S1
MediumCVE-2025-6530: Denial of Service in 70mai M300
MediumCVE-2025-6529: Use of Default Credentials in 70mai M300
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.