CVE-2025-30131

An issue was discovered on IROAD Dashcam FX2 devices. An unauthenticated file upload endpoint can be leveraged to execute arbitrary commands by uploading a CGI-based webshell. Once a file is uploaded, the attacker can execute commands with root privileges, gaining full control over the dashcam. Additionally, by uploading a netcat (nc) binary, the attacker can establish a reverse shell, maintaining persistent remote and privileged access to the device. This allows complete device takeover.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:iroadau:fx2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:iroadau:fx2:-:*:*:*:*:*:*:*

History

06 Nov 2025, 20:24

Type Values Removed Values Added
CPE cpe:2.3:h:iroadau:fx2:-:*:*:*:*:*:*:*
cpe:2.3:o:iroadau:fx2_firmware:-:*:*:*:*:*:*:*
First Time Iroadau
Iroadau fx2
Iroadau fx2 Firmware
References () https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-11---cve-2025-30131-unrestricted-webshell - () https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-11---cve-2025-30131-unrestricted-webshell - Third Party Advisory, Exploit
References () https://www.iroadau.com.au/downloads/ - () https://www.iroadau.com.au/downloads/ - Product

Information

Published : 2025-06-26 17:15

Updated : 2025-11-06 20:24


NVD link : CVE-2025-30131

Mitre link : CVE-2025-30131

CVE.ORG link : CVE-2025-30131


JSON object : View

Products Affected

iroadau

  • fx2
  • fx2_firmware
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type