On IROAD v9 devices, the dashcam has hardcoded default credentials ("qwertyuiop") that cannot be changed by the user. This allows an attacker within Wi-Fi range to connect to the device's network to perform sniffing.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7238 | On IROAD v9 devices, the dashcam has hardcoded default credentials ("qwertyuiop") that cannot be changed by the user. This allows an attacker within Wi-Fi range to connect to the device's network to perform sniffing. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 21 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-259 | |
| Metrics |
cvssV3_1
|
Tue, 18 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On IROAD v9 devices, the dashcam has hardcoded default credentials ("qwertyuiop") that cannot be changed by the user. This allows an attacker within Wi-Fi range to connect to the device's network to perform sniffing. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-21T16:30:03.088Z
Reserved: 2025-03-17T00:00:00.000Z
Link: CVE-2025-30106
Updated: 2025-03-21T16:24:58.688Z
Status : Awaiting Analysis
Published: 2025-03-18T14:15:46.480
Modified: 2025-03-21T17:15:40.227
Link: CVE-2025-30106
No data.
OpenCVE Enrichment
No data.
EUVD