CVE-2025-30133

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass the pairing/registration requirement on IROAD Dashcam FX2 devices by connecting to the dashcam's Wi-Fi network and accessing its HTTP server directly. This enables unauthorized access to device functions without triggering any alerts. All users of IROAD Dashcam FX2 devices with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • IROAD Dashcam FX2
Versions: All versions prior to patch
Operating Systems: Embedded dashcam firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in default configuration with Wi-Fi enabled and default password unchanged.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of dashcam functionality including unauthorized access to video feeds, device settings modification, potential data exfiltration, and disabling of security features.

🟠

Likely Case

Unauthorized viewing of dashcam footage, modification of device settings, and potential privacy violations.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized Wi-Fi connections.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical proximity to connect to dashcam Wi-Fi network.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.iroadau.com.au/downloads/

Restart Required: No

Instructions:

Check vendor website for firmware updates. If available, download and install via IROAD X View app following vendor instructions.

🔧 Temporary Workarounds

Change Wi-Fi Password

all

Change the default Wi-Fi password from 'qwertyuiop' to a strong, unique password

Disable Wi-Fi When Not in Use

all

Turn off dashcam Wi-Fi functionality when not actively pairing with mobile app

🧯 If You Can't Patch

  • Physically secure dashcam to prevent unauthorized physical access
  • Monitor for unauthorized Wi-Fi connections to dashcam network

🔍 How to Verify

Check if Vulnerable:

Connect to dashcam Wi-Fi network using default password 'qwertyuiop', then attempt to access http://192.168.10.1 without pairing via IROAD X View app.

Check Version:

Check firmware version in IROAD X View app settings or device display

Verify Fix Applied:

After applying any vendor patch, repeat vulnerability check - access to HTTP server should require proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected HTTP server access logs
  • Multiple failed pairing attempts

Network Indicators:

  • Unauthorized devices connecting to dashcam Wi-Fi network
  • HTTP traffic to 192.168.10.1 from unexpected sources

SIEM Query:

Not applicable - primarily physical/local network attack

🔗 References

📤 Share & Export