CVE-2025-30113
Published: 18 March 2025
Description
Security Summary
CVE-2025-30113 affects the Forvia Hella HELLA Driving Recorder DR 820, specifically its Android application (APK). The vulnerability involves hardcoded credentials stored in cleartext, enabling unauthorized access to device settings via ports 9091 and 9092. Classified as CWE-798 (Use of Hard-coded Credentials), it was published on 2025-03-18 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
An attacker who gains access to the dashcam's network can exploit these credentials remotely without requiring privileges, authentication, or user interaction. Successful exploitation grants unauthorized control over device settings, compromising confidentiality, integrity, and availability to a high degree.
Advisories and related resources, including the GitHub repository at https://github.com/geo-chen/Hella and the Medium post at https://medium.com/@geochen/cve-draft-hella-driving-recorder-dr-820-ff8c4e2cca26, provide further technical details on the issue. No specific patches or mitigation steps are detailed in the core CVE information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Hardcoded credentials enable unauthorized access to API (port 9091) and RTSP (port 9092), facilitating default/valid account usage, unsecured credentials in files, system/file discovery via settings and video lists, video capture via live stream, data from local system (footage), location discovery from recordings, and file deletion.