CVE-2025-30112

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass the physical button pairing requirement on 70mai Dash Cam 1S devices by directly connecting to the device's network and accessing its API and RTSP services. Attackers can gain unauthorized access to the dashcam's features and data without user interaction. Only users of 70mai Dash Cam 1S devices are affected.

💻 Affected Systems

Products:
  • 70mai Dash Cam 1S
Versions: All firmware versions prior to patch
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in default configuration when dashcam's Wi-Fi is enabled for mobile app pairing.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access live video feeds, recorded footage, device settings, and potentially install malicious firmware updates, leading to privacy violations and device compromise.

🟠

Likely Case

Unauthorized access to live and recorded video footage, enabling surveillance of vehicle occupants and surroundings without the owner's knowledge.

🟢

If Mitigated

Limited to network-adjacent attackers who can physically access the device's Wi-Fi network, reducing exposure to local threats only.

🌐 Internet-Facing: LOW - The dashcam's services are only accessible when connected to its local Wi-Fi network, not directly exposed to the internet.
🏢 Internal Only: HIGH - Within the dashcam's Wi-Fi range, attackers can bypass authentication without physical interaction with the device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical proximity to connect to the dashcam's Wi-Fi network, then simple HTTP/RTSP requests to bypass authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with vendor for specific firmware version

Vendor Advisory: https://www.70mai.com/cam1s/

Restart Required: Yes

Instructions:

1. Open the 70mai mobile app. 2. Connect to your dashcam. 3. Check for firmware updates in app settings. 4. Install any available updates. 5. The dashcam will restart automatically after update.

🔧 Temporary Workarounds

Disable Wi-Fi when not pairing

all

Turn off the dashcam's Wi-Fi functionality when not actively pairing with the mobile app to prevent network access.

Use physical security measures

all

Park in secure locations and ensure the dashcam is not easily accessible to prevent physical network connection attempts.

🧯 If You Can't Patch

  • Disable Wi-Fi functionality completely in dashcam settings
  • Physically disconnect dashcam when vehicle is parked in unsecured locations

🔍 How to Verify

Check if Vulnerable:

Connect to the dashcam's Wi-Fi network, then attempt to access http://[dashcam-ip]:80/api endpoints or rtsp://[dashcam-ip]:554 without pressing the physical pairing button.

Check Version:

Check firmware version in 70mai mobile app under device settings or consult vendor documentation.

Verify Fix Applied:

After updating firmware, attempt the same connection method - successful authentication should now require physical button press as designed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API access without preceding pairing events
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unexpected connections to port 80/554 from unauthorized devices on dashcam's network
  • RTSP stream access without proper authentication handshake

SIEM Query:

Not applicable - embedded device with limited logging capabilities

🔗 References

📤 Share & Export