On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-288 | |
Metrics |
cvssV3_1
|
Mon, 24 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-03-24T00:00:00.000Z
Updated: 2025-03-24T18:28:34.746Z
Reserved: 2025-03-17T00:00:00.000Z
Link: CVE-2025-30112

Updated: 2025-03-24T18:09:21.862Z

Status : Received
Published: 2025-03-24T17:15:21.550
Modified: 2025-03-24T19:15:52.530
Link: CVE-2025-30112

No data.