CVE-2025-30141

CVE-2025-30141

Título es
CVE-2025-30141

Mar, 18/03/2025 – 20:15

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2025-30141

Descripción en
An issue was discovered on G-Net Dashcam BB GONX devices. One can Remotely Dump Video Footage and the Live Video Stream. It exposes API endpoints on ports 9091 and 9092 that allow remote access to recorded and live video feeds. An attacker who connects to the dashcam's network can retrieve all stored recordings and convert them from JDR format to MP4. Additionally, port 9092's RTSP stream can be accessed remotely, allowing real-time video feeds to be extracted without the owner's knowledge.

18/03/2025

18/03/2025

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Referencias


  • https://github.com/geo-chen/GNET

  • https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201
  • Enviar en el boletín
    Off

    CVE-2025-30139

    CVE-2025-30139

    Título es
    CVE-2025-30139

    Mar, 18/03/2025 – 20:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-30139

    Descripción en
    An issue was discovered on G-Net Dashcam BB GONX devices. Default credentials for SSID cannot be changed. It broadcasts a fixed SSID with default credentials that cannot be changed. This allows any nearby attacker to connect to the dashcam's network without restriction. Once connected, an attacker can sniff on connected devices such as the user's smartphone. The SSID is also always broadcasted.

    18/03/2025

    18/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/geo-chen/GNET

  • https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201
  • Enviar en el boletín
    Off

    CVE-2025-30138

    CVE-2025-30138

    Título es
    CVE-2025-30138

    Mar, 18/03/2025 – 20:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-30138

    Descripción en
    An issue was discovered on G-Net Dashcam BB GONX devices. Managing Settings and Obtaining Sensitive Data and Sabotaging Car Battery can be performed by unauthorized persons. It allows unauthorized users to modify critical system settings once connected to its network. Attackers can extract sensitive car and driver information, mute dashcam alerts to prevent detection, disable recording functionality, or even factory reset the device. Additionally, they can disable battery protection, causing the dashcam to drain the car battery when left on overnight. These actions not only compromise privacy but also pose potential physical harm by rendering the dashcam non-functional or causing vehicle battery failure.

    18/03/2025

    18/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/geo-chen/GNET

  • https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201
  • Enviar en el boletín
    Off

    CVE-2025-30137

    CVE-2025-30137

    Título es
    CVE-2025-30137

    Mar, 18/03/2025 – 20:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-30137

    Descripción en
    An issue was discovered in the G-Net GNET APK 2.6.2. Hardcoded credentials exist in in APK for ports 9091 and 9092. The GNET mobile application contains hardcoded credentials that provide unauthorized access to the dashcam's API endpoints on ports 9091 and 9092. Once the GNET SSID is connected to, the attacker sends a crafted authentication command with TibetList and 000000 to list settings of the dashcam at port 9091. There's a separate set of credentials for port 9092 (stream) that is also exposed in cleartext: admin + tibet. For settings, the required credentials are adim + 000000.

    18/03/2025

    18/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/geo-chen/GNET

  • https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201
  • Enviar en el boletín
    Off

    CVE-2025-25582

    CVE-2025-25582

    Título es
    CVE-2025-25582

    Mar, 18/03/2025 – 16:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-25582

    Descripción en
    yimioa before v2024.07.04 was discovered to contain a SQL injection vulnerability via the selectNoticeList() method at /xml/OaNoticeMapper.xml.

    18/03/2025

    18/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://gitee.com/r1bbit/yimioa/issues/IBI74K
  • Enviar en el boletín
    Off

    CVE-2025-27688

    CVE-2025-27688

    Título es
    CVE-2025-27688

    Mar, 18/03/2025 – 16:15

    Tipo
    CWE-732

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27688

    Descripción en
    Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

    18/03/2025

    18/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107
  • Enviar en el boletín
    Off

    CVE-2025-25589

    CVE-2025-25589

    Título es
    CVE-2025-25589

    Mar, 18/03/2025 – 16:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-25589

    Descripción en
    An XML external entity (XXE) injection vulnerability in the component /weixin/aes/XMLParse.java of yimioa before v2024.07.04 allows attackers to execute arbitrary code via supplying a crafted XML file.

    18/03/2025

    18/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://gitee.com/r1bbit/yimioa/issues/IBI81R
  • Enviar en el boletín
    Off

    CVE-2025-25586

    CVE-2025-25586

    Título es
    CVE-2025-25586

    Mar, 18/03/2025 – 16:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-25586

    Descripción en
    yimioa before v2024.07.04 was discovered to contain an information disclosure vulnerability via the component /resources/application.yml.

    18/03/2025

    18/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://gitee.com/r1bbit/yimioa/issues/IBI7LR
  • Enviar en el boletín
    Off

    CVE-2024-56347

    CVE-2024-56347

    Título es
    CVE-2024-56347

    Mar, 18/03/2025 – 17:15

    Tipo
    CWE-114

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-56347

    Descripción en
    IBM AIX 7.2 and 7.3 nimsh service SSL/TLS protection mechanisms could allow a remote attacker to execute arbitrary commands due to improper process controls.

    18/03/2025

    18/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    9.60

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    CRITICAL

    Referencias


  • https://www.ibm.com/support/pages/node/7186621
  • Enviar en el boletín
    Off

    CVE-2024-56346

    CVE-2024-56346

    Título es
    CVE-2024-56346

    Mar, 18/03/2025 – 17:15

    Tipo
    CWE-114

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-56346

    Descripción en
    IBM AIX 7.2 and 7.3 nimesis NIM master service could allow a remote attacker to execute arbitrary commands due to improper process controls.

    18/03/2025

    18/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    10.00

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    CRITICAL

    Referencias


  • https://www.ibm.com/support/pages/node/7186621
  • Enviar en el boletín
    Off