G-Net Dashcam BB GONX, Default Credentials Vulnerability, CVE-2025-30139 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-30139 affects G-Net Dashcam BB GONX devices due to an unchangeable default SSID and credentials. The dashcam broadcasts a fixed Wi-Fi SSID with hardcoded login details, allowing nearby attackers to connect without authentication. Once connected, the attacker can intercept traffic from paired devices (e.g., smartphones) and potentially access dashcam feeds or stored data. The SSID remains always visible, making devices easily discoverable.

DailyCVE Form

Platform: G-Net Dashcam BB GONX
Version: All firmware
Vulnerability: Default credentials
Severity: Critical
Date: 07/02/2025

Prediction: Patch expected by 10/2025

What Undercode Say

Analytics:

nmap -p 80,443 <dashcam_IP>
airodump-ng --bssid <SSID_MAC> wlan0
tcpdump -i wlan0 -w traffic.pcap

How Exploit:

1. Scan for broadcasted SSID.

2. Connect using default credentials.

3. Sniff traffic via MITM.

Protection from this CVE:

  • Disable Wi-Fi when unused.
  • Await firmware update.
  • Use network segmentation.

Impact:

  • Unauthorized data access.
  • Privacy breach.
  • Device hijacking.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top