CVE-2025-30139
Published: 18 March 2025
Summary
CVE-2025-30139 is a critical-severity Use of Default Credentials (CWE-1392) vulnerability in Gnetsystem G-Onx Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 47.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-18 (Wireless Access) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-18 mandates secure wireless access configurations including authentication and encryption, directly preventing unauthorized connections to the dashcam's fixed-SSID network with default credentials.
IA-5 requires management of authenticators to prohibit defaults and enforce strong, changeable credentials, addressing the unchangeable default Wi-Fi credentials core to this CVE.
SC-40 implements cryptographic protections for wireless links, mitigating traffic sniffing by attackers who connect using default credentials.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Default unchangeable WiFi credentials (T1078.001) and hardcoded credentials (T1552.001) enable unauthorized access, facilitating network sniffing (T1040), MAC impersonation (T1656), data collection from system/removable media (T1005, T1025), info discovery (T1082), file deletion (T1070.004), and endpoint DoS via battery drain (T1499).
NVD Description
An issue was discovered on G-Net Dashcam BB GONX devices. Default credentials for SSID cannot be changed. It broadcasts a fixed SSID with default credentials that cannot be changed. This allows any nearby attacker to connect to the dashcam's network…
more
without restriction. Once connected, an attacker can sniff on connected devices such as the user's smartphone. The SSID is also always broadcasted.
Deeper analysisAI
CVE-2025-30139 is a high-severity vulnerability (CVSS 3.1 score of 9.8) affecting G-Net Dashcam BB GONX devices, published on 2025-03-18. The issue stems from unchangeable default credentials for the device's Wi-Fi SSID, which is fixed and always broadcasted. This configuration, linked to CWE-1392, prevents users from securing the network with custom credentials, exposing the dashcam's wireless interface to unauthorized access.
Any nearby attacker within Wi-Fi range can exploit this vulnerability with no privileges, authentication, or user interaction required (AV:N/AC:L/PR:N/UI:N). Upon connecting to the dashcam's network using the default credentials, the attacker gains unrestricted access and can sniff traffic from other connected devices, such as the user's smartphone, potentially compromising sensitive data in transit.
References for further details include the GitHub repository at https://github.com/geo-chen/GNET and the product page at https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201, though no specific advisories on patches or mitigations are detailed in the available information.
Details
- CWE(s)