CVE-2025-11942

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass the pairing authentication mechanism in 70mai X200 dashcams, enabling unauthorized access to the device. It affects all 70mai X200 dashcams with firmware up to October 10, 2025. Attackers can exploit this remotely without authentication.

💻 Affected Systems

Products:
  • 70mai X200 dashcam
Versions: All versions up to 20251010
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All 70mai X200 dashcams with firmware dated October 10, 2025 or earlier are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of dashcam functionality, potential access to stored video footage, manipulation of device settings, and possible lateral movement if connected to other systems.

🟠

Likely Case

Unauthorized access to dashcam features, potential theft of recorded footage, and manipulation of device operations.

🟢

If Mitigated

Limited impact if dashcam is isolated from networks and physical access is controlled, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily weaponizable. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Monitor 70mai website for firmware updates and apply when released.

🔧 Temporary Workarounds

Network Isolation

all

Disconnect dashcam from Wi-Fi networks and use only local storage

Disable Wi-Fi in dashcam settings

Physical Security

all

Restrict physical access to dashcam and disable Bluetooth pairing

Disable Bluetooth in dashcam settings

🧯 If You Can't Patch

  • Disconnect device from all networks and use as standalone recording device
  • Implement network segmentation to isolate dashcam from critical systems

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device settings. If version is 20251010 or earlier, device is vulnerable.

Check Version:

Navigate to Settings > About Device in dashcam interface

Verify Fix Applied:

Check for firmware updates from 70mai and verify version is newer than 20251010

📡 Detection & Monitoring

Log Indicators:

  • Unexpected pairing attempts
  • Unauthorized access to device settings

Network Indicators:

  • Unusual network traffic from dashcam IP
  • Unexpected Bluetooth pairing requests

SIEM Query:

source="dashcam" AND (event="pairing_failed" OR event="unauthorized_access")

🔗 References

📤 Share & Export