CVE-2025-30127

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers who gain access to Marbella KR8s Dashcam FF devices (via default/weak passwords) to download all video and audio recordings containing sensitive footage, routes, and conversations. The exploit uses ports 7777-7779 to access recordings without proper authentication. All users of affected dashcam devices are impacted.

💻 Affected Systems

Products:
  • Marbella KR8s Dashcam FF
Versions: 2.0.8 (specific version mentioned, other versions may be affected)
Operating Systems: Embedded dashcam firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access via default, common, or cracked passwords to exploit the open ports vulnerability.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all recorded footage including sensitive locations, conversations, and personal information leading to privacy violations, stalking, or corporate espionage.

🟠

Likely Case

Unauthorized access to dashcam recordings exposing travel patterns, conversations, and sensitive visual information from vehicles.

🟢

If Mitigated

Limited exposure if strong unique passwords are used and network access is restricted, though the underlying vulnerability remains.

🌐 Internet-Facing: HIGH - Devices exposed to internet with default/weak credentials are trivially exploitable.
🏢 Internal Only: MEDIUM - Requires network access but exploitation is straightforward once credentials are obtained.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires credential access first, then simple socket connections to ports 7777-7779. Public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check vendor website (makagps.com) for firmware updates.

🔧 Temporary Workarounds

Change Default Credentials

all

Immediately change all default passwords to strong, unique credentials.

Use device administration interface to change passwords

Network Segmentation

all

Isolate dashcam devices on separate VLAN or network segment with restricted access.

Configure firewall rules to block external access to ports 7777-7779

🧯 If You Can't Patch

  • Disconnect devices from internet/external networks
  • Implement strict network access controls and monitor for connection attempts to ports 7777-7779

🔍 How to Verify

Check if Vulnerable:

Check if device is accessible on network and test connection to ports 7777-7779 after obtaining credentials.

Check Version:

Check device firmware version in administration interface (typically 2.0.8 for vulnerable version)

Verify Fix Applied:

Verify strong passwords are set and test that ports 7777-7779 are not accessible without proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts
  • Successful logins from unusual sources

Network Indicators:

  • Connections to ports 7777-7779 from unauthorized sources
  • Large data transfers from dashcam ports

SIEM Query:

source_port:7777 OR source_port:7778 OR source_port:7779 AND destination_ip:[dashcam_ip]

🔗 References

📤 Share & Export