CVE-2025-30142 – G-Net Dashcam BB GONX MAC Spoofing Authentication Bypass

The following table lists the changes that have been made to the
CVE-2025-30142 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Mar. 18, 2025

    Action Type Old Value New Value
    Added Description An issue was discovered on G-Net Dashcam BB GONX devices. Bypassing of Device Pairing can occur. It uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device.
    Added Reference https://github.com/geo-chen/GNET
    Added Reference https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201
Share the Post:

Related Posts