An issue was discovered on IROAD Dashcam FX2 devices. Bypass of Device Pairing/Registration can occur. It requires device registration via the "IROAD X View" app for authentication, but its HTTP server lacks this restriction. Once connected to the dashcam's Wi-Fi network via the default password ("qwertyuiop"), an attacker can directly access the HTTP server at http://192.168.10.1 without undergoing the pairing process. Additionally, no alert is triggered on the device when an attacker connects, making this intrusion completely silent.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-22908 An issue was discovered on IROAD Dashcam FX2 devices. Bypass of Device Pairing/Registration can occur. It requires device registration via the "IROAD X View" app for authentication, but its HTTP server lacks this restriction. Once connected to the dashcam's Wi-Fi network via the default password ("qwertyuiop"), an attacker can directly access the HTTP server at http://192.168.10.1 without undergoing the pairing process. Additionally, no alert is triggered on the device when an attacker connects, making this intrusion completely silent.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 06 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Iroadau
Iroadau fx2
Iroadau fx2 Firmware
CPEs cpe:2.3:h:iroadau:fx2:-:*:*:*:*:*:*:*
cpe:2.3:o:iroadau:fx2_firmware:-:*:*:*:*:*:*:*
Vendors & Products Iroadau
Iroadau fx2
Iroadau fx2 Firmware

Thu, 31 Jul 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Iroad
Iroad dashcam Fx2
Vendors & Products Iroad
Iroad dashcam Fx2

Wed, 30 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 28 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Description An issue was discovered on IROAD Dashcam FX2 devices. Bypass of Device Pairing/Registration can occur. It requires device registration via the "IROAD X View" app for authentication, but its HTTP server lacks this restriction. Once connected to the dashcam's Wi-Fi network via the default password ("qwertyuiop"), an attacker can directly access the HTTP server at http://192.168.10.1 without undergoing the pairing process. Additionally, no alert is triggered on the device when an attacker connects, making this intrusion completely silent.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-07-30T15:17:37.598Z

Reserved: 2025-03-17T00:00:00.000Z

Link: CVE-2025-30133

cve-icon Vulnrichment

Updated: 2025-07-30T13:33:09.891Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-28T14:15:26.830

Modified: 2025-11-06T20:07:15.797

Link: CVE-2025-30133

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-31T10:21:30Z