CVE-2025-2345

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in IROAD dash cams allows remote attackers to bypass authorization controls, potentially accessing sensitive data or manipulating device settings. It affects IROAD Dash Cam X5 and X6 models with firmware up to March 8, 2025. Attackers can exploit this without authentication from anywhere with network access to the device.

💻 Affected Systems

Products:
  • IROAD Dash Cam X5
  • IROAD Dash Cam X6
Versions: All versions up to 20250308
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with default configurations are vulnerable. Requires network access to the dash cam's management interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attackers could disable vehicle monitoring, drain car batteries by keeping cameras powered on, access stored video footage, or potentially compromise connected vehicle systems.

🟠

Likely Case

Unauthorized access to dash cam settings and stored video data, potential privacy violations, and possible battery drain from keeping devices powered.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to isolated dash cam device without affecting other vehicle systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains technical details and proof-of-concept. Remote exploitation requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Check vendor website periodically for firmware updates.

🔧 Temporary Workarounds

Network Isolation

all

Isolate dash cam network from internet and other critical networks

Disable Remote Management

all

Turn off Wi-Fi/network connectivity features if not required

🧯 If You Can't Patch

  • Physically disconnect dash cam from vehicle when not in use
  • Place dash cam on isolated network segment with no internet access

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device settings menu. If version is 20250308 or earlier, device is vulnerable.

Check Version:

Check device settings menu for firmware version information

Verify Fix Applied:

No fix available to verify. Monitor vendor website for firmware updates.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to dash cam management interface
  • Unexpected configuration changes

Network Indicators:

  • Unusual network traffic to dash cam management ports
  • External IP addresses accessing dash cam interfaces

SIEM Query:

source_ip=external AND dest_port=80,443 AND dest_ip=dash_cam_subnet

🔗 References

📤 Share & Export