The following table lists the changes that have been made to the
CVE-2025-30142 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Mar. 18, 2025
Action Type Old Value New Value Added Description An issue was discovered on G-Net Dashcam BB GONX devices. Bypassing of Device Pairing can occur. It uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device. Added Reference https://github.com/geo-chen/GNET Added Reference https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201