G-Net Dashcam BB GONX, Domain Hijacking Vulnerability, CVE-2025-30140 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-30140 affects G-Net Dashcam BB GONX devices due to the use of an unregistered public domain name for internal communication. The device relies on this domain for critical functions, but since it was not owned by G-Net, an attacker could register it and intercept traffic. If the dashcam or associated services resolve this domain externally instead of locally, sensitive data could be leaked or manipulated via man-in-the-middle attacks. The vulnerability discoverer registered the domain to prevent exploitation, but unpatched devices remain at risk if the domain changes ownership again.

DailyCVE Form

Platform: G-Net Dashcam BB GONX
Version: All vulnerable versions
Vulnerability: Domain hijacking
Severity: Critical
Date: 07/02/2025

Prediction: Patch expected by 09/2025

What Undercode Say

nslookup internal.gnet-dashcam.com
tcpdump -i eth0 port 53
curl -I http://<dashcam_IP>/api/config

How Exploit

  • Attacker registers the unclaimed domain.
  • DNS queries leak to external servers.
  • Intercept/modify device traffic.

Protection from this CVE

  • Update firmware when available.
  • Block external DNS for device.
  • Use internal DNS override.

Impact

  • Data exfiltration.
  • MITM attacks.
  • Device compromise.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top