- Description
- On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 7.1
- Impact score
- 5.5
- Exploitability score
- 1.6
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
- Severity
- HIGH
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-288
- Hype score
- Not currently trending
🚨 CVE-2025-30112 🔴 HIGH (7.1) 🏢 Unknown Vendor - Unknown Product 🏗️ Unknown Version 🔗 https://t.co/oSgh3qTu7t 🔗 https://t.co/PdSRNzPK7m #CyberCron #VulnAlert #InfoSec https://t.co/jP98iEeMHu
@cybercronai
26 Mar 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-30112 On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device… https://t.co/kZlFqoXsQg
@CVEnew
24 Mar 2025
348 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes