Listen to this Post
How the CVE Works
CVE-2025-30141 exploits exposed API endpoints on ports 9091 and 9092 in G-Net Dashcam BB GONX devices. Attackers on the same network can:
1. Access `/record` endpoint (port 9091) to download stored footage in JDR format, which can be converted to MP4.
2. Connect to port 9092 via RTSP (Real-Time Streaming Protocol) to intercept live video feeds without authentication.
3. Use crafted HTTP requests to bypass access controls, extracting sensitive recordings. The lack of encryption and weak API authentication enables remote exploitation.
DailyCVE Form
Platform: G-Net Dashcam
Version: BB GONX
Vulnerability: Unauthorized video access
Severity: Critical
Date: 07/02/2025
Prediction: Patch by 10/2025
What Undercode Say
Analytics:
nmap -p 9091,9092 <target_IP> ffmpeg -i rtsp://<target_IP>:9092/live -c copy output.mp4 curl http://<target_IP>:9091/record -o footage.jdr
How Exploit:
1. Network sniffing for dashcam IP.
2. RTSP stream hijacking via VLC/FFmpeg.
3. JDR-to-MP4 conversion using proprietary tools.
Protection from this CVE:
1. Disable remote API access.
2. Firmware update (when available).
3. Network segmentation.
Impact:
- Privacy breach (video leaks).
- Surveillance bypass.
- Legal/regulatory risks.
Sources:
Reported By: nvd.nist.gov
Extra Source Hub:
Undercode