{"id":59801,"date":"2025-08-01T13:26:43","date_gmt":"2025-08-01T13:26:43","guid":{"rendered":""},"modified":"2025-09-02T21:31:25","modified_gmt":"2025-09-03T03:31:25","slug":"cve-2025-30135-unauthenticated-data-retrieval-vulnerability-in-iroad-dashcam-fx2-devices","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-30135-unauthenticated-data-retrieval-vulnerability-in-iroad-dashcam-fx2-devices\/","title":{"rendered":"<strong>CVE-2025-30135: Unauthenticated Data Retrieval Vulnerability in IROAD Dashcam FX2 Devices<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The vulnerability CVE-2025-30135 is a critical security flaw discovered in IROAD Dashcam FX2 devices. It pertains to the lack of authentication controls on both the HTTP and RTSP interfaces, which can potentially lead to unauthorized data retrieval and potential system compromise. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-28946-php-remote-file-inclusion-vulnerability-in-bzotheme-printxtore\/\"  data-wpil-monitor-id=\"66176\">vulnerability is particularly significant as it exposes sensitive files<\/a> and video recordings, putting users&#8217; privacy and security at risk. As dashcams are widely utilized for various security purposes, the impact of this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-47998-severe-heap-based-buffer-overflow-vulnerability-in-windows-routing-and-remote-access-service\/\"  data-wpil-monitor-id=\"68899\">vulnerability can be widespread and severe<\/a> if not mitigated promptly.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-30135<br \/>\nSeverity: Critical &#8211; 9.4 (CVSS score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: Unauthenticated data retrieval, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36600-dell-bios-improper-access-control-vulnerability-allows-potential-system-compromise\/\"  data-wpil-monitor-id=\"70313\">potential system<\/a> compromise, and data leakage.<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3235241377\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-30133-device-pairing-bypass-vulnerability-in-iroad-dashcam-fx2-devices\/\"  data-wpil-monitor-id=\"75640\">IROAD Dashcam FX2<\/a> | All versions<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit works by taking advantage of the lack of authentication controls on the HTTP and RTSP interfaces of IROAD <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-30124-critical-vulnerability-in-marbella-kr8s-dashcam-devices-exposes-clear-text-passwords\/\"  data-wpil-monitor-id=\"70312\">Dashcam FX2 devices<\/a>. An attacker can connect to the HTTP interface at http:\/\/192.168.10.1\/mnt\/extsd\/event\/ to download all stored video recordings in an unencrypted format. Similarly, the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-25268-unauthenticated-adjacent-attacker-accessing-api-endpoint\/\"  data-wpil-monitor-id=\"77682\">attacker can access<\/a> the RTSP stream on port 8554 without needing any authentication, allowing them to view live footage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-98505050\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a conceptual example of how an attacker might exploit this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36845-server-side-request-forgery-ssrf-vulnerability-in-eveo-urve-web-manager\/\"  data-wpil-monitor-id=\"70677\">vulnerability using an HTTP request<\/a> to download the stored video recordings:<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/mnt\/extsd\/event\/ HTTP\/1.1\nHost: 192.168.10.1<\/code><\/pre>\n<p>Alternatively, an attacker might use an RTSP client to access the live footage:<\/p>\n<pre><code class=\"\" data-line=\"\">rtsp:\/\/192.168.10.1:8554\/<\/code><\/pre>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>It is strongly advised that <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50738-memos-application-vulnerability-allows-for-unauthorized-user-information-disclosure\/\"  data-wpil-monitor-id=\"70314\">users apply the vendor-supplied patch to address this vulnerability<\/a>. In the absence of such a patch, users can use a Web Application Firewall (WAF) or Intrusion Detection System (IDS) as temporary mitigation solutions. These systems can help detect and block <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-54378-unauthorized-access-vulnerability-in-hax-cms\/\"  data-wpil-monitor-id=\"68898\">unauthorized attempts to access<\/a> the sensitive interfaces. Users should also consider implementing secure access controls, such as robust <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-45777-critical-vulnerability-in-otp-mechanism-bypassing-authentication-in-chavara-matrimony-site\/\"  data-wpil-monitor-id=\"70929\">authentication mechanisms<\/a>, to further protect these interfaces.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The vulnerability CVE-2025-30135 is a critical security flaw discovered in IROAD Dashcam FX2 devices. It pertains to the lack of authentication controls on both the HTTP and RTSP interfaces, which can potentially lead to unauthorized data retrieval and potential system compromise. This vulnerability is particularly significant as it exposes sensitive files and video recordings, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-59801","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=59801"}],"version-history":[{"count":7,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59801\/revisions"}],"predecessor-version":[{"id":70084,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59801\/revisions\/70084"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=59801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=59801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=59801"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=59801"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=59801"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=59801"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=59801"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=59801"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=59801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}