Cyber Posture

CVE-2025-30132

Critical

Published: 18 March 2025

Published
18 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0008 23.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may steal data by exfiltrating it over an existing command and control channel.

Security Summary

CVE-2025-30132 is a high-severity vulnerability (CVSS 9.1, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) affecting IROAD Dashcam V devices, classified under CWE-284 (Improper Access Control). The issue stems from the devices using an unregistered public domain name as an internal domain, which is not owned by IROAD. This misconfiguration exposes the devices to risks where the domain resolution could be hijacked, as the firmware or related services may attempt to resolve it over the public Internet rather than locally.

Any remote attacker without privileges can exploit this vulnerability by registering the unowned domain name. Once registered, the attacker can intercept sensitive traffic from the dashcam, enabling man-in-the-middle attacks or data exfiltration. The low attack complexity and lack of user interaction requirements make it highly practical for widespread exploitation against exposed devices.

The vulnerability was disclosed by researcher geo-chen via GitHub repositories at https://github.com/geo-chen/IROAD-V and https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-6-public-domain-used-for-internal-domain-name, which detail the finding. No official advisories, patches, or mitigation guidance from IROAD are referenced in the available information.

Details

CWE(s)
CWE-284

MITRE ATT&CK Enterprise Techniques

T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
T1041 Exfiltration Over C2 Channel Exfiltration
Adversaries may steal data by exfiltrating it over an existing command and control channel.
Why these techniques?

Vulnerability allows domain registration to hijack resolution, directly enabling traffic interception for Adversary-in-the-Middle (T1557) and data exfiltration over the resulting channel (T1041).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References