CVE-2025-6529

8.8 HIGH

📋 TL;DR

The 70mai M300 dash cam has a critical vulnerability where its Telnet service uses default credentials, allowing attackers on the same local network to gain unauthorized access. This can lead to remote code execution and full device compromise. Only 70mai M300 dash cams with firmware up to June 11, 2025 are affected.

💻 Affected Systems

Products:
  • 70mai M300 dash cam
Versions: All versions up to 20250611
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when Telnet service is enabled (default configuration). Requires attacker to be on same local network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control of the dash cam, execute arbitrary code, install malware, steal video footage, and potentially pivot to other network devices.

🟠

Likely Case

Unauthorized access to the dash cam's system, enabling data theft, device manipulation, and installation of persistent backdoors.

🟢

If Mitigated

Limited impact if network segmentation isolates the device and default credentials are changed.

🌐 Internet-Facing: LOW (requires local network access, not directly internet-exposed by default)
🏢 Internal Only: HIGH (exploitable by any attacker on the same local network)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit uses default credentials (username/password combination disclosed in public GitHub repository). Simple telnet connection with known credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider workarounds or replacement.

🔧 Temporary Workarounds

Disable Telnet Service

linux

Permanently disable the Telnet service on the dash cam to prevent credential-based attacks.

telnet 192.168.1.100
login with default credentials
systemctl disable telnet
systemctl stop telnet

Change Default Credentials

linux

Modify the default Telnet credentials to prevent unauthorized access.

telnet 192.168.1.100
login with default credentials
passwd
set new strong password

🧯 If You Can't Patch

  • Network segmentation: Isolate dash cam on separate VLAN with strict firewall rules
  • Disable Telnet via physical reset if possible and use only required services

🔍 How to Verify

Check if Vulnerable:

Attempt telnet connection to dash cam IP on port 23 using default credentials from public exploit.

Check Version:

Check device firmware version in settings menu or via telnet: cat /etc/version

Verify Fix Applied:

Verify Telnet service is disabled or credentials no longer work. Test with telnet connection attempts.

📡 Detection & Monitoring

Log Indicators:

  • Failed/successful Telnet authentication attempts
  • Unexpected process execution from Telnet sessions

Network Indicators:

  • Telnet connections to dash cam IP on port 23
  • Unusual outbound connections from dash cam

SIEM Query:

source="dashcam" AND (event="telnet_login" OR port=23)

🔗 References

📤 Share & Export