Cyber Posture

CVE-2025-30137

Critical

Published: 18 March 2025

Published
18 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0025 48.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-30137 is a high-severity vulnerability (CVSS 9.8) in the G-Net GNET APK version 2.6.2, stemming from hardcoded credentials (CWE-798) embedded in the mobile application. These credentials grant unauthorized access to the dashcam's API endpoints exposed on ports 9091 (settings) and 9092 (stream). Specifically, the credentials "adim" and "000000" work for settings on port 9091, while "admin" and "tibet" apply to the stream on port 9092.

An attacker with network proximity can exploit this by connecting to the GNET SSID and sending a crafted authentication command, such as "TibetList" paired with "000000", to port 9091 to enumerate dashcam settings. No privileges, user interaction, or complex prerequisites are required (AV:N/AC:L/PR:N/UI:N), enabling remote exploitation over the network. Successful access allows high confidentiality, integrity, and availability impacts, potentially permitting attackers to view live streams, modify settings, or disrupt dashcam operations.

References include a GitHub repository at https://github.com/geo-chen/GNET detailing the issue and the vendor product page at https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201, though no specific patches or mitigation steps are outlined in available details.

Details

CWE(s)
CWE-798

MITRE ATT&CK Enterprise Techniques

T1078.003 Local Accounts Stealth
Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Hardcoded credentials enable use of valid local device accounts (T1078.003) to exploit exposed API endpoints (T1190).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References