A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/passwd of the component Password Hash Handler. The manipulation leads to password hash with insufficient computational effort. Access to the local network is required for this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-9-exposed-root-password | Third Party Advisory |
| https://vuldb.com/?ctiid.299815 | Permissions Required VDB Entry |
| https://vuldb.com/?id.299815 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
06 Nov 2025, 20:38
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:iroadau:fx2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:iroadau:fx2:-:*:*:*:*:*:*:* |
|
| Summary |
|
|
| First Time |
Iroadau fx2
Iroadau fx2 Firmware Iroadau |
|
| References | () https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-9-exposed-root-password - Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.299815 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.299815 - Third Party Advisory, VDB Entry |
16 Mar 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-16 22:15
Updated : 2025-11-06 20:38
NVD link : CVE-2025-2349
Mitre link : CVE-2025-2349
CVE.ORG link : CVE-2025-2349
JSON object : View
Products Affected
iroadau
- fx2_firmware
- fx2
