CVE-2025-30106
Published: 18 March 2025
Summary
CVE-2025-30106 is a high-severity Use of Hard-coded Password (CWE-259) vulnerability in Iroad Dashcam (inferred from references). Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 17.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-18 (Wireless Access) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
IA-5 mandates changing default authenticators prior to first use and ensuring sufficient strength of mechanism, directly addressing hardcoded unchangeable credentials on the dashcam.
AC-18 requires usage restrictions, prior authorization, and authentication plus encryption for wireless access, preventing attackers from connecting to the device's Wi-Fi network.
SI-2 requires identifying, reporting, and correcting flaws such as hardcoded credentials in system components like the IROAD v9 dashcam.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hardcoded default credentials directly enable use of default accounts for unauthorized Wi-Fi access (T1078.001); gained network access facilitates packet sniffing and traffic capture (T1040).
NVD Description
On IROAD v9 devices, the dashcam has hardcoded default credentials ("qwertyuiop") that cannot be changed by the user. This allows an attacker within Wi-Fi range to connect to the device's network to perform sniffing.
Deeper analysisAI
CVE-2025-30106 is a vulnerability in IROAD v9 dashcam devices stemming from hardcoded default credentials ("qwertyuiop") that cannot be changed by the user. This issue, mapped to CWE-259 (Use of Hard-coded Password), enables unauthorized access to the device's Wi-Fi network. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.
An attacker within Wi-Fi range of the affected device can exploit this vulnerability with low complexity and no required privileges or user interaction. By using the hardcoded credentials, the attacker gains network access, allowing them to perform packet sniffing and potentially capture sensitive traffic transmitted over the device's network.
References for this CVE include a GitHub repository at https://github.com/geo-chen/IROAD-V, which details the vulnerability, and a product page at https://iroad-dashcam.nl/iroad/iroad-x5/. No specific advisories or patches mentioning mitigations are provided in the available information.
Details
- CWE(s)