On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection.
History

Mon, 24 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-288
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Description On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-03-24T18:28:34.746Z

Reserved: 2025-03-17T00:00:00.000Z

Link: CVE-2025-30112

cve-icon Vulnrichment

Updated: 2025-03-24T18:09:21.862Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-24T17:15:21.550

Modified: 2025-03-27T16:45:46.410

Link: CVE-2025-30112

cve-icon Redhat

No data.