An issue was discovered on IROAD Dashcam FX2 devices. Bypass of Device Pairing/Registration can occur. It requires device registration via the "IROAD X View" app for authentication, but its HTTP server lacks this restriction. Once connected to the dashcam's Wi-Fi network via the default password ("qwertyuiop"), an attacker can directly access the HTTP server at http://192.168.10.1 without undergoing the pairing process. Additionally, no alert is triggered on the device when an attacker connects, making this intrusion completely silent.
History

Thu, 31 Jul 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Iroad
Iroad dashcam Fx2
Vendors & Products Iroad
Iroad dashcam Fx2

Wed, 30 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 28 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Description An issue was discovered on IROAD Dashcam FX2 devices. Bypass of Device Pairing/Registration can occur. It requires device registration via the "IROAD X View" app for authentication, but its HTTP server lacks this restriction. Once connected to the dashcam's Wi-Fi network via the default password ("qwertyuiop"), an attacker can directly access the HTTP server at http://192.168.10.1 without undergoing the pairing process. Additionally, no alert is triggered on the device when an attacker connects, making this intrusion completely silent.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-07-28T00:00:00.000Z

Updated: 2025-07-30T15:17:37.598Z

Reserved: 2025-03-17T00:00:00.000Z

Link: CVE-2025-30133

cve-icon Vulnrichment

Updated: 2025-07-30T13:33:09.891Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-28T14:15:26.830

Modified: 2025-07-30T16:15:27.050

Link: CVE-2025-30133

cve-icon Redhat

No data.