We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30131



Description

An issue was discovered on IROAD Dashcam FX2 devices. An unauthenticated file upload endpoint can be leveraged to execute arbitrary commands by uploading a CGI-based webshell. Once a file is uploaded, the attacker can execute commands with root privileges, gaining full control over the dashcam. Additionally, by uploading a netcat (nc) binary, the attacker can establish a reverse shell, maintaining persistent remote and privileged access to the device. This allows complete device takeover.

Reserved 2025-03-17 | Published 2025-06-26 | Updated 2025-06-26 | Assigner mitre

References

www.iroadau.com.au/downloads/

github.com/geo-chen/IROAD?tab=readme-ov-file

cve.org (CVE-2025-30131)

nvd.nist.gov (CVE-2025-30131)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30131

Support options

Helpdesk Chat, Email, Knowledgebase