CVE-2025-6528
📋 TL;DR
This vulnerability allows unauthenticated access to live video streams from 70mai M300 dash cameras. Attackers on the same local network can view real-time camera feeds without credentials. Only 70mai M300 dash cameras with firmware up to June 11, 2025 are affected.
💻 Affected Systems
- 70mai M300 Dash Camera
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete loss of privacy as attackers can monitor all video feeds from vulnerable cameras in real-time, potentially capturing sensitive activities or locations.
Likely Case
Unauthorized surveillance of vehicle interiors/exteriors, potentially capturing personal conversations, license plates, or sensitive business activities.
If Mitigated
Limited to no impact if cameras are isolated from untrusted networks or if network segmentation prevents lateral movement.
🎯 Exploit Status
Exploit requires only network access and knowledge of the camera's IP address; no authentication or special tools needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Monitor 70mai official channels for firmware updates. Consider workarounds below.
🔧 Temporary Workarounds
Network Segmentation
allIsolate dash cameras on a separate VLAN or network segment away from untrusted devices.
Firewall Rules
linuxBlock RTSP traffic (port 554) to dash cameras from all except authorized management systems.
iptables -A INPUT -p tcp --dport 554 -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport 554 -j DROP
🧯 If You Can't Patch
- Physically disconnect cameras from networks when not needed for live streaming
- Use VPN for remote access instead of exposing cameras directly to local networks
🔍 How to Verify
Check if Vulnerable:
Attempt to access rtsp://[CAMERA_IP]/livestream/12 without credentials. If video stream loads, device is vulnerable.
Check Version:
Check firmware version in 70mai mobile app under Device Settings > About
Verify Fix Applied:
After applying workarounds, verify rtsp://[CAMERA_IP]/livestream/12 is no longer accessible without authentication.
📡 Detection & Monitoring
Log Indicators:
- Unusual RTSP connection attempts from unauthorized IPs
- Multiple failed authentication attempts followed by successful stream access
Network Indicators:
- RTSP traffic to port 554 without preceding authentication handshake
- Stream requests to /livestream/12 from unexpected sources
SIEM Query:
source_port=554 AND (uri_path="/livestream/12" OR protocol="RTSP") AND NOT src_ip IN [AUTHORIZED_IPS]