CVE-2025-6525

4.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthorized configuration changes on 70mai 1S dashcams via a local network attack. Attackers on the same network can modify device settings without proper authentication. Only users of affected 70mai 1S devices are impacted.

💻 Affected Systems

Products:
  • 70mai 1S dashcam
Versions: All versions up to 20250611
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with the vulnerable firmware version; requires attacker access to the local network.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could disable security features, enable remote access, or brick the device by applying invalid configurations.

🟠

Likely Case

Unauthorized modification of dashcam settings such as disabling recording, changing WiFi credentials, or altering timestamp/data settings.

🟢

If Mitigated

With proper network segmentation, the impact is limited to configuration changes that don't compromise the broader network.

🌐 Internet-Facing: LOW - The vulnerability requires local network access and is not directly exploitable from the internet.
🏢 Internal Only: MEDIUM - Attackers on the same local network can exploit this to modify device configurations without authorization.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub; requires HTTP POST requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Monitor 70mai website/app for firmware updates and apply when released.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate 70mai devices on a separate VLAN or network segment to prevent local network attacks.

Firewall Rules

all

Block access to port 80/443 on 70mai devices from untrusted network segments.

🧯 If You Can't Patch

  • Disconnect 70mai 1S from networks with untrusted devices
  • Monitor network traffic for unauthorized configuration requests to /cgi-bin/Config.cgi

🔍 How to Verify

Check if Vulnerable:

Check firmware version in 70mai app; if version is 20250611 or earlier, device is vulnerable.

Check Version:

Check via 70mai mobile app: Device Settings > About > Firmware Version

Verify Fix Applied:

Verify firmware version is newer than 20250611 in the 70mai mobile app.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /cgi-bin/Config.cgi?action=set from unauthorized IPs

Network Indicators:

  • Unusual configuration change traffic to dashcam IP addresses

SIEM Query:

source_ip IN (dashcam_ips) AND url_path CONTAINS '/cgi-bin/Config.cgi' AND http_method = 'POST'

🔗 References

📤 Share & Export