CVE-2025-30133
📋 TL;DR
This vulnerability allows attackers to bypass the pairing/registration requirement on IROAD Dashcam FX2 devices by connecting to the dashcam's Wi-Fi network and accessing its HTTP server directly. This enables unauthorized access to device functions without triggering any alerts. All users of IROAD Dashcam FX2 devices with vulnerable firmware are affected.
💻 Affected Systems
- IROAD Dashcam FX2
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of dashcam functionality including unauthorized access to video feeds, device settings modification, potential data exfiltration, and disabling of security features.
Likely Case
Unauthorized viewing of dashcam footage, modification of device settings, and potential privacy violations.
If Mitigated
Limited impact if proper network segmentation and access controls prevent unauthorized Wi-Fi connections.
🎯 Exploit Status
Exploitation requires physical proximity to connect to dashcam Wi-Fi network.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.iroadau.com.au/downloads/
Restart Required: No
Instructions:
Check vendor website for firmware updates. If available, download and install via IROAD X View app following vendor instructions.
🔧 Temporary Workarounds
Change Wi-Fi Password
allChange the default Wi-Fi password from 'qwertyuiop' to a strong, unique password
Disable Wi-Fi When Not in Use
allTurn off dashcam Wi-Fi functionality when not actively pairing with mobile app
🧯 If You Can't Patch
- Physically secure dashcam to prevent unauthorized physical access
- Monitor for unauthorized Wi-Fi connections to dashcam network
🔍 How to Verify
Check if Vulnerable:
Connect to dashcam Wi-Fi network using default password 'qwertyuiop', then attempt to access http://192.168.10.1 without pairing via IROAD X View app.
Check Version:
Check firmware version in IROAD X View app settings or device display
Verify Fix Applied:
After applying any vendor patch, repeat vulnerability check - access to HTTP server should require proper authentication.
📡 Detection & Monitoring
Log Indicators:
- Unexpected HTTP server access logs
- Multiple failed pairing attempts
Network Indicators:
- Unauthorized devices connecting to dashcam Wi-Fi network
- HTTP traffic to 192.168.10.1 from unexpected sources
SIEM Query:
Not applicable - primarily physical/local network attack
🔗 References
- https://github.com/geo-chen/IROAD/blob/main/README.md#finding-12---cve-2025-30133-unprotected-url-shortcut
- https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-7-bypass-of-device-pairingregistration-for-iroad-fx2
- https://www.iroadau.com.au/downloads/
- https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-7-bypass-of-device-pairingregistration-for-iroad-fx2