Submit #510951: i-DRIVE Dashcam i11, i12 Authentication Bypass by Primary Weaknessinfo

Titlei-DRIVE Dashcam i11, i12 Authentication Bypass by Primary Weakness
DescriptionBypassing of device pairing - The dashcam's authentication mechanism relies on a default password combined with a second factor (device registration). However, the device pairing process is based on MAC address recognition, which can be bypassed. An attacker can obtain the MAC address of a paired device through methods such as ARP scanning, spoof the MAC address, and successfully connect to the dashcam without completing the pairing process. This grants unauthorized access to the device’s network.
Source⚠️ https://github.com/geo-chen/i-Drive
User
 geochen (UID 78995)
Submission02/27/2025 04:57 PM (4 months ago)
Moderation03/03/2025 01:25 PM (4 days later)
StatusAccepted
VulDB Entry298194 [i-Drive i11/i12 up to 20250227 Device Pairing authentication bypass]
Points20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!