On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-288 | |
Metrics |
cvssV3_1
|
Mon, 24 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-24T18:28:34.746Z
Reserved: 2025-03-17T00:00:00.000Z
Link: CVE-2025-30112

Updated: 2025-03-24T18:09:21.862Z

Status : Awaiting Analysis
Published: 2025-03-24T17:15:21.550
Modified: 2025-03-27T16:45:46.410
Link: CVE-2025-30112

No data.