On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-288 | |
| Metrics |
cvssV3_1
|
Mon, 24 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-03-24T00:00:00.000Z
Updated: 2025-03-24T18:28:34.746Z
Reserved: 2025-03-17T00:00:00.000Z
Link: CVE-2025-30112
Updated: 2025-03-24T18:09:21.862Z
Status : Awaiting Analysis
Published: 2025-03-24T17:15:21.550
Modified: 2025-03-27T16:45:46.410
Link: CVE-2025-30112
No data.