CVE-2025-12915

6.4 MEDIUM

📋 TL;DR

This vulnerability in 70mai X200 dashcams allows local attackers to hijack init scripts through file inclusion, potentially enabling persistent unauthorized access. It affects 70mai X200 dashcams up to version 20251019. Attackers need physical or local access to the device to exploit this vulnerability.

💻 Affected Systems

Products:
  • 70mai X200 Omni Dashcam
Versions: Up to 20251019
Operating Systems: Embedded Linux (dashcam firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Init Script Handler component. Requires physical or local access to the dashcam device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access could achieve persistent root-level compromise of the dashcam, enabling data theft, manipulation of recordings, or using the device as a foothold in connected networks.

🟠

Likely Case

Local attackers could install backdoors or malware that persists across reboots, compromising dashcam functionality and potentially accessing stored video data.

🟢

If Mitigated

With proper physical security controls preventing unauthorized access to devices, the vulnerability remains dormant with minimal risk.

🌐 Internet-Facing: LOW - The vulnerability requires local access and does not appear to be remotely exploitable based on the description.
🏢 Internal Only: MEDIUM - Devices within physical reach of attackers could be compromised, but exploitation requires high complexity and local access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploit details are publicly available on GitHub. Attack requires local access and high complexity manipulation. Vendor has not responded to disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Monitor 70mai official channels for firmware updates addressing CVE-2025-12915.

🔧 Temporary Workarounds

Physical Security Controls

all

Prevent unauthorized physical access to dashcam devices

Firmware Integrity Monitoring

all

Monitor dashcam firmware for unauthorized modifications

🧯 If You Can't Patch

  • Implement strict physical security controls for dashcam installations
  • Isolate dashcam networks from critical systems and monitor for unusual activity

🔍 How to Verify

Check if Vulnerable:

Check dashcam firmware version. If version is 20251019 or earlier, device is vulnerable.

Check Version:

Check device settings or manufacturer documentation for firmware version information

Verify Fix Applied:

Update to firmware version newer than 20251019 when available from vendor.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected init script modifications
  • Unauthorized file system changes in /etc/init.d or similar directories

Network Indicators:

  • Unusual network traffic from dashcam devices
  • Connections to unexpected external IPs

SIEM Query:

Device logs showing file modifications in system init directories OR network traffic anomalies from dashcam IPs

🔗 References

📤 Share & Export