CVE-2025-30112
📋 TL;DR
This vulnerability allows attackers to bypass the physical button pairing requirement on 70mai Dash Cam 1S devices by directly connecting to the device's network and accessing its API and RTSP services. Attackers can gain unauthorized access to the dashcam's features and data without user interaction. Only users of 70mai Dash Cam 1S devices are affected.
💻 Affected Systems
- 70mai Dash Cam 1S
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access live video feeds, recorded footage, device settings, and potentially install malicious firmware updates, leading to privacy violations and device compromise.
Likely Case
Unauthorized access to live and recorded video footage, enabling surveillance of vehicle occupants and surroundings without the owner's knowledge.
If Mitigated
Limited to network-adjacent attackers who can physically access the device's Wi-Fi network, reducing exposure to local threats only.
🎯 Exploit Status
Exploitation requires physical proximity to connect to the dashcam's Wi-Fi network, then simple HTTP/RTSP requests to bypass authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check with vendor for specific firmware version
Vendor Advisory: https://www.70mai.com/cam1s/
Restart Required: Yes
Instructions:
1. Open the 70mai mobile app. 2. Connect to your dashcam. 3. Check for firmware updates in app settings. 4. Install any available updates. 5. The dashcam will restart automatically after update.
🔧 Temporary Workarounds
Disable Wi-Fi when not pairing
allTurn off the dashcam's Wi-Fi functionality when not actively pairing with the mobile app to prevent network access.
Use physical security measures
allPark in secure locations and ensure the dashcam is not easily accessible to prevent physical network connection attempts.
🧯 If You Can't Patch
- Disable Wi-Fi functionality completely in dashcam settings
- Physically disconnect dashcam when vehicle is parked in unsecured locations
🔍 How to Verify
Check if Vulnerable:
Connect to the dashcam's Wi-Fi network, then attempt to access http://[dashcam-ip]:80/api endpoints or rtsp://[dashcam-ip]:554 without pressing the physical pairing button.
Check Version:
Check firmware version in 70mai mobile app under device settings or consult vendor documentation.
Verify Fix Applied:
After updating firmware, attempt the same connection method - successful authentication should now require physical button press as designed.
📡 Detection & Monitoring
Log Indicators:
- Unusual API access without preceding pairing events
- Multiple failed authentication attempts followed by successful access
Network Indicators:
- Unexpected connections to port 80/554 from unauthorized devices on dashcam's network
- RTSP stream access without proper authentication handshake
SIEM Query:
Not applicable - embedded device with limited logging capabilities