fkie_cve-2025-30135
Vulnerability from fkie_nvd
Published
2025-07-25 20:15
Modified
2025-11-06 20:23
Severity ?
Summary
An issue was discovered on IROAD Dashcam FX2 devices. Dumping Files Over HTTP and RTSP Without Authentication can occur. It lacks authentication controls on its HTTP and RTSP interfaces, allowing attackers to retrieve sensitive files and video recordings. By connecting to http://192.168.10.1/mnt/extsd/event/, an attacker can download all stored video recordings in an unencrypted manner. Additionally, the RTSP stream on port 8554 is accessible without authentication, allowing an attacker to view live footage.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| iroadau | fx2_firmware | - | |
| iroadau | fx2 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iroadau:fx2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C21728-4D54-42DB-98C8-B0B7C7A38B2C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iroadau:fx2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E62E438-2D69-401D-B5A8-B54565CE049E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on IROAD Dashcam FX2 devices. Dumping Files Over HTTP and RTSP Without Authentication can occur. It lacks authentication controls on its HTTP and RTSP interfaces, allowing attackers to retrieve sensitive files and video recordings. By connecting to http://192.168.10.1/mnt/extsd/event/, an attacker can download all stored video recordings in an unencrypted manner. Additionally, the RTSP stream on port 8554 is accessible without authentication, allowing an attacker to view live footage."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en los dispositivos IROAD Dashcam FX2. Es posible que se descarguen archivos mediante HTTP y RTSP sin autenticaci\u00f3n. Carecen de controles de autenticaci\u00f3n en sus interfaces HTTP y RTSP, lo que permite a los atacantes recuperar archivos y grabaciones de v\u00eddeo confidenciales. Al conectarse a http://192.168.10.1/mnt/extsd/event/, un atacante puede descargar todas las grabaciones de v\u00eddeo almacenadas sin cifrar. Adem\u00e1s, se puede acceder a la transmisi\u00f3n RTSP en el puerto 8554 sin autenticaci\u00f3n, lo que permite a un atacante ver grabaciones en directo."
}
],
"id": "CVE-2025-30135",
"lastModified": "2025-11-06T20:23:29.610",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-07-25T20:15:24.203",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-13---cve-2025-30135-locking-owner-out-of-device-dos"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-8-dumping-files-over-http-and-rtsp-without-authentication"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.iroadau.com.au/downloads/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…