Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m4rv-8xc3-h37q

Опубликовано: 18 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

An issue was discovered on G-Net Dashcam BB GONX devices. Bypassing of Device Pairing can occur. It uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device.

An issue was discovered on G-Net Dashcam BB GONX devices. Bypassing of Device Pairing can occur. It uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device.

EPSS

Процентиль: 18%
0.00058
Низкий

8.1 High

CVSS3

Дефекты

CWE-290

Связанные уязвимости

CVSS3: 8.1
nvd
11 месяцев назад

An issue was discovered on G-Net Dashcam BB GONX devices. Bypassing of Device Pairing can occur. It uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device.

EPSS

Процентиль: 18%
0.00058
Низкий

8.1 High

CVSS3

Дефекты

CWE-290