A vulnerability was found in IROAD Dash Cam FX2 up to 20250308 and classified as problematic. This issue affects some unknown processing of the component Device Registration. The manipulation of the argument Password with the input qwertyuiop leads to use of default password. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-6673 A vulnerability was found in IROAD Dash Cam FX2 up to 20250308 and classified as problematic. This issue affects some unknown processing of the component Device Registration. The manipulation of the argument Password with the input qwertyuiop leads to use of default password. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Iroadau
Iroadau fx2
Iroadau fx2 Firmware
CPEs cpe:2.3:h:iroadau:fx2:-:*:*:*:*:*:*:*
cpe:2.3:o:iroadau:fx2_firmware:*:*:*:*:*:*:*:*
Vendors & Products Iroadau
Iroadau fx2
Iroadau fx2 Firmware

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00023}

epss

{'score': 0.00033}


Mon, 17 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 16 Mar 2025 20:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in IROAD Dash Cam FX2 up to 20250308 and classified as problematic. This issue affects some unknown processing of the component Device Registration. The manipulation of the argument Password with the input qwertyuiop leads to use of default password. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.
Title IROAD Dash Cam FX2 Device Registration default password
Weaknesses CWE-1393
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:A/AC:L/Au:N/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-03-17T13:45:11.469Z

Reserved: 2025-03-15T18:22:33.123Z

Link: CVE-2025-2347

cve-icon Vulnrichment

Updated: 2025-03-17T13:45:02.479Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-16T21:15:37.617

Modified: 2025-11-04T21:12:29.280

Link: CVE-2025-2347

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.