CVE-2025-2347

6.3 MEDIUM

📋 TL;DR

The IROAD Dash Cam FX2 uses a default password 'qwertyuiop' during device registration, allowing attackers on the same local network to bypass authentication. This affects all IROAD FX2 dash cams with firmware up to March 8, 2025. Attackers can potentially pair with and control vulnerable dash cams.

💻 Affected Systems

Products:
  • IROAD Dash Cam FX2
Versions: All versions up to 20250308 (March 8, 2025)
Operating Systems: Embedded dash cam firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in default configuration; requires device registration/pairing attempt with password 'qwertyuiop'.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full control of dash cam, accesses video footage, disables recording, or tampers with device settings while remaining undetected.

🟠

Likely Case

Unauthorized pairing with dash cam allowing access to live video feed and recorded footage from within the local network.

🟢

If Mitigated

Limited to network reconnaissance if proper network segmentation and access controls prevent local network access.

🌐 Internet-Facing: LOW - Exploit requires local network access; dash cams typically not directly internet-facing.
🏢 Internal Only: HIGH - Attackers on same local network (Wi-Fi/LAN) can exploit this with minimal effort using published details.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details publicly disclosed on GitHub; requires attacker on same network but no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Monitor IROAD website for firmware updates addressing CVE-2025-2347.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate dash cam network from other devices using VLANs or separate network

Change Default Password

all

If device allows password change during registration, use strong unique password

🧯 If You Can't Patch

  • Physically disconnect dash cam from network when not in use
  • Monitor network for unauthorized pairing attempts to dash cam IP/MAC

🔍 How to Verify

Check if Vulnerable:

Check firmware version in dash cam settings; if version is 20250308 or earlier, device is vulnerable.

Check Version:

Check via IROAD mobile app or device settings menu (no CLI command available)

Verify Fix Applied:

Verify firmware version is newer than 20250308 after any vendor update.

📡 Detection & Monitoring

Log Indicators:

  • Failed registration attempts
  • Successful registrations from unknown devices
  • Multiple registration attempts with password 'qwertyuiop'

Network Indicators:

  • UDP/TCP traffic to dash cam port 80/443 from unauthorized IPs
  • ARP requests for dash cam MAC from unknown devices

SIEM Query:

source_ip!=authorized_device AND dest_ip=dash_cam_ip AND (event_description CONTAINS 'registration' OR event_description CONTAINS 'pairing')

🔗 References

📤 Share & Export