CVE-2025-30109
📋 TL;DR
The IROAD dashcam mobile application contains hardcoded credentials that allow attackers on the same Wi-Fi network to access API endpoints and retrieve sensitive device information including live and recorded footage. This affects users of IROAD dashcams who have the vulnerable mobile app installed and connected to the same network as the dashcam.
💻 Affected Systems
- IROAD dashcam mobile application
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain unauthorized access to live dashcam feeds and recorded footage, potentially compromising privacy, capturing sensitive locations, and enabling surveillance of vehicle occupants.
Likely Case
Local network attackers access dashcam footage and device information, violating privacy and potentially tracking vehicle movements.
If Mitigated
With proper network segmentation and access controls, impact is limited to authorized users only.
🎯 Exploit Status
Hardcoded credentials are embedded in the APK and can be extracted via reverse engineering.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: No
Instructions:
1. Check for updated version from official app store. 2. Uninstall vulnerable version. 3. Install patched version if available.
🔧 Temporary Workarounds
Network Segmentation
allIsolate dashcam network from other devices
Disable Wi-Fi When Not Needed
allTurn off dashcam Wi-Fi when not actively using mobile app
🧯 If You Can't Patch
- Disconnect dashcam from Wi-Fi network entirely
- Use physical storage retrieval instead of wireless access
🔍 How to Verify
Check if Vulnerable:
Check app version in mobile device settings; if version is 5.2.5, system is vulnerable.
Check Version:
Check in Android: Settings > Apps > IROAD > App Info
Verify Fix Applied:
Verify app version is updated beyond 5.2.5 and test API access with previously known credentials.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized API access attempts on ports 9091/9092
- Multiple failed authentication attempts from unexpected sources
Network Indicators:
- Unexpected traffic to dashcam ports 9091/9092
- API requests using hardcoded credentials
SIEM Query:
source_ip=* AND dest_port IN (9091, 9092) AND http_user_agent CONTAINS 'iroad'