A vulnerability was found in IROAD Dash Cam FX2 up to 20250308 and classified as problematic. This issue affects some unknown processing of the component Device Registration. The manipulation of the argument Password with the input qwertyuiop leads to use of default password. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-7-bypass-of-device-pairingregistration-for-iroad-fx2 | Third Party Advisory |
| https://vuldb.com/?ctiid.299813 | Permissions Required VDB Entry |
| https://vuldb.com/?id.299813 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
04 Nov 2025, 21:12
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-7-bypass-of-device-pairingregistration-for-iroad-fx2 - Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.299813 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.299813 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:h:iroadau:fx2:-:*:*:*:*:*:*:* cpe:2.3:o:iroadau:fx2_firmware:*:*:*:*:*:*:*:* |
|
| First Time |
Iroadau
Iroadau fx2 Iroadau fx2 Firmware |
Information
Published : 2025-03-16 21:15
Updated : 2025-11-04 21:12
NVD link : CVE-2025-2347
Mitre link : CVE-2025-2347
CVE.ORG link : CVE-2025-2347
JSON object : View
Products Affected
iroadau
- fx2
- fx2_firmware
CWE
CWE-1393
Use of Default Password
