Title | i-DRIVE Dashcam i11, i12 Authentication Bypass by Primary Weakness |
---|
Description | Bypassing of device pairing - The dashcam's authentication mechanism relies on a default password combined with a second factor (device registration). However, the device pairing process is based on MAC address recognition, which can be bypassed. An attacker can obtain the MAC address of a paired device through methods such as ARP scanning, spoof the MAC address, and successfully connect to the dashcam without completing the pairing process. This grants unauthorized access to the device’s network. |
---|
Source | ⚠️ https://github.com/geo-chen/i-Drive |
---|
User | geochen (UID 78995) |
---|
Submission | 02/27/2025 04:57 PM (4 months ago) |
---|
Moderation | 03/03/2025 01:25 PM (4 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 298194 [i-Drive i11/i12 up to 20250227 Device Pairing authentication bypass] |
---|
Points | 20 |
---|