CVE-2025-30135
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-06
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| iroadau | fx2_firmware | * |
| iroadau | fx2 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects IROAD Dashcam FX2 devices, where the HTTP and RTSP interfaces lack authentication controls. This allows attackers to access and download sensitive files and video recordings without any credentials. Specifically, attackers can connect to a specific URL to download all stored video recordings unencrypted, and they can also access the RTSP stream to view live footage without authentication.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to sensitive video recordings and live footage from the dashcam device. This can result in privacy breaches, exposure of personal or sensitive information, and potential misuse of the recorded data by attackers.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if the device's HTTP interface at http://192.168.10.1/mnt/extsd/event/ is accessible without authentication and if the RTSP stream on port 8554 is open and unauthenticated. For example, use commands like 'curl http://192.168.10.1/mnt/extsd/event/' to see if files can be downloaded without credentials, and 'ffplay rtsp://192.168.10.1:8554/' or 'rtsp://<device-ip>:8554/' to check if the RTSP stream is accessible without authentication.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting network access to the device's HTTP and RTSP interfaces, such as placing the device behind a firewall or VLAN to limit exposure. Disable or restrict RTSP and HTTP services if possible, or implement network-level authentication controls. Additionally, monitor network traffic for unauthorized access attempts to these interfaces.