G-Net Dashcam BB GONX, Unauthorized Settings Modification & Data Leak, CVE-2025-30138 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-30138 exploits weak authentication in G-Net Dashcam BB GONX devices. Attackers connecting to the dashcam’s network can send unauthenticated API requests to manipulate settings, extract GPS logs, driver data, and disable critical functions. The device fails to validate session tokens, allowing unauthorized access. A crafted POST request to `/api/settings` can disable battery protection, while `/api/data/export` leaks sensitive trip records. Factory reset commands (/api/reset) further erase evidence. The dashcam’s lack of firmware signing permits malicious updates via MITM attacks.

DailyCVE Form

Platform: G-Net Dashcam BB GONX
Version: All < v4.7.2
Vulnerability: Unauthenticated API access
Severity: Critical
Date: 2025-07-01

Prediction: Patch by 2025-09-15

What Undercode Say

Analytics:

nmap -p 80,443 --script http-vuln-cve2025-30138 <target>
curl -X POST http://<dashcam_ip>/api/settings -d '{"battery_protection":"disable"}'

Exploit:

  • Unauthenticated `/api/settings` modification.
  • Data exfiltration via /api/data/export.
  • MITM firmware downgrade.

Protection from this CVE:

  • Update to v4.7.2+.
  • Enable HTTPS.
  • Network segmentation.

Impact:

  • Car battery drain.
  • Privacy breach.
  • Evidence tampering.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

🔐JOIN OUR CYBER WORLD [ CVE News • HackMonitor • UndercodeNews ]

💬 Whatsapp | 💬 Telegram

📢 Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | 🔗 Linkedin Featured Image

Scroll to Top