CVE-2025-30142

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authentication on G-Net Dashcam BB GONX devices by spoofing the MAC address of a previously paired device. Attackers can gain full access to the dashcam without proper authentication. All users of affected G-Net dashcam devices are at risk.

💻 Affected Systems

Products:
  • G-Net Dashcam BB GONX
Versions: All versions prior to patch
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices using MAC address as sole pairing mechanism are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of dashcam, potentially accessing live video feeds, stored footage, and device settings, enabling surveillance, data theft, or device manipulation.

🟠

Likely Case

Unauthorized access to dashcam feeds and stored footage, compromising privacy and potentially enabling stalking or evidence tampering.

🟢

If Mitigated

Limited impact with proper network segmentation and MAC address filtering, restricting attacker access to dashcam functionality.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to capture legitimate MAC address via ARP scanning or sniffing, then spoofing that address.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for latest firmware

Vendor Advisory: https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201

Restart Required: Yes

Instructions:

1. Check G-Net website for firmware updates. 2. Download latest firmware. 3. Connect dashcam to computer. 4. Run firmware update tool. 5. Restart device after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate dashcam on separate VLAN or network segment to limit exposure.

MAC Address Filtering

all

Configure network equipment to only allow specific MAC addresses to communicate with dashcam.

🧯 If You Can't Patch

  • Disable wireless connectivity and use wired connection only if supported.
  • Physically secure device to prevent unauthorized physical access.

🔍 How to Verify

Check if Vulnerable:

Check if device uses only MAC address verification for pairing by reviewing pairing process documentation.

Check Version:

Check device settings menu for firmware version information.

Verify Fix Applied:

Test if MAC address spoofing still allows unauthorized pairing after firmware update.

📡 Detection & Monitoring

Log Indicators:

  • Multiple MAC addresses connecting to same dashcam
  • Unusual pairing events

Network Indicators:

  • ARP spoofing activity on dashcam network
  • Multiple devices with same MAC address

SIEM Query:

source="network_traffic" MAC_address=* AND event="pairing_attempt" | stats count by MAC_address

🔗 References

📤 Share & Export