CVE-2025-30135
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-25

Last updated on: 2025-11-06

Assigner: MITRE

Description
An issue was discovered on IROAD Dashcam FX2 devices. Dumping Files Over HTTP and RTSP Without Authentication can occur. It lacks authentication controls on its HTTP and RTSP interfaces, allowing attackers to retrieve sensitive files and video recordings. By connecting to http://192.168.10.1/mnt/extsd/event/, an attacker can download all stored video recordings in an unencrypted manner. Additionally, the RTSP stream on port 8554 is accessible without authentication, allowing an attacker to view live footage.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-25
Last Modified
2025-11-06
Generated
2026-05-07
AI Q&A
2025-07-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
iroadau fx2_firmware *
iroadau fx2 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects IROAD Dashcam FX2 devices, where the HTTP and RTSP interfaces lack authentication controls. This allows attackers to access and download sensitive files and video recordings without any credentials. Specifically, attackers can connect to a specific URL to download all stored video recordings unencrypted, and they can also access the RTSP stream to view live footage without authentication.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized access to sensitive video recordings and live footage from the dashcam device. This can result in privacy breaches, exposure of personal or sensitive information, and potential misuse of the recorded data by attackers.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking if the device's HTTP interface at http://192.168.10.1/mnt/extsd/event/ is accessible without authentication and if the RTSP stream on port 8554 is open and unauthenticated. For example, use commands like 'curl http://192.168.10.1/mnt/extsd/event/' to see if files can be downloaded without credentials, and 'ffplay rtsp://192.168.10.1:8554/' or 'rtsp://<device-ip>:8554/' to check if the RTSP stream is accessible without authentication.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting network access to the device's HTTP and RTSP interfaces, such as placing the device behind a firewall or VLAN to limit exposure. Disable or restrict RTSP and HTTP services if possible, or implement network-level authentication controls. Additionally, monitor network traffic for unauthorized access attempts to these interfaces.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart