CVE-2025-30135 – IROAD Dashcam FX2 HTTP and RTSP Authentication Bypass

The following table lists the changes that have been made to the
CVE-2025-30135 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jul. 25, 2025

    Action Type Old Value New Value
    Added Description An issue was discovered on IROAD Dashcam FX2 devices. Dumping Files Over HTTP and RTSP Without Authentication can occur. It lacks authentication controls on its HTTP and RTSP interfaces, allowing attackers to retrieve sensitive files and video recordings. By connecting to http://192.168.10.1/mnt/extsd/event/, an attacker can download all stored video recordings in an unencrypted manner. Additionally, the RTSP stream on port 8554 is accessible without authentication, allowing an attacker to view live footage.
    Added Reference https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-13—cve-2025-30135-locking-owner-out-of-device-dos
    Added Reference https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-8-dumping-files-over-http-and-rtsp-without-authentication
    Added Reference https://www.iroadau.com.au/downloads/
  • CVE Modified
    by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Jul. 25, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
    Added CWE CWE-306
Share the Post:

Related Posts