Логотип exploitDog
bind:CVE-2025-30112
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-30112

Количество 2

Количество 2

nvd логотип

CVE-2025-30112

11 месяцев назад

On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-77gx-q4qr-rpgr

11 месяцев назад

On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection.

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-30112

On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection.

CVSS3: 7.1
0%
Низкий
11 месяцев назад
github логотип
GHSA-77gx-q4qr-rpgr

On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection.

CVSS3: 7.1
0%
Низкий
11 месяцев назад

Уязвимостей на страницу