CVE-2025-30109

6.5 MEDIUM

📋 TL;DR

The IROAD dashcam mobile application contains hardcoded credentials that allow attackers on the same Wi-Fi network to access API endpoints and retrieve sensitive device information including live and recorded footage. This affects users of IROAD dashcams who have the vulnerable mobile app installed and connected to the same network as the dashcam.

💻 Affected Systems

Products:
  • IROAD dashcam mobile application
Versions: APK 5.2.5
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to be on same Wi-Fi network as dashcam and mobile device.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to live dashcam feeds and recorded footage, potentially compromising privacy, capturing sensitive locations, and enabling surveillance of vehicle occupants.

🟠

Likely Case

Local network attackers access dashcam footage and device information, violating privacy and potentially tracking vehicle movements.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to authorized users only.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Hardcoded credentials are embedded in the APK and can be extracted via reverse engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Check for updated version from official app store. 2. Uninstall vulnerable version. 3. Install patched version if available.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate dashcam network from other devices

Disable Wi-Fi When Not Needed

all

Turn off dashcam Wi-Fi when not actively using mobile app

🧯 If You Can't Patch

  • Disconnect dashcam from Wi-Fi network entirely
  • Use physical storage retrieval instead of wireless access

🔍 How to Verify

Check if Vulnerable:

Check app version in mobile device settings; if version is 5.2.5, system is vulnerable.

Check Version:

Check in Android: Settings > Apps > IROAD > App Info

Verify Fix Applied:

Verify app version is updated beyond 5.2.5 and test API access with previously known credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized API access attempts on ports 9091/9092
  • Multiple failed authentication attempts from unexpected sources

Network Indicators:

  • Unexpected traffic to dashcam ports 9091/9092
  • API requests using hardcoded credentials

SIEM Query:

source_ip=* AND dest_port IN (9091, 9092) AND http_user_agent CONTAINS 'iroad'

🔗 References

📤 Share & Export