Submit #603298: IROAD Dashcam Q Series Protection Mechanism Failureinfo

TitleIROAD Dashcam Q Series Protection Mechanism Failure
DescriptionThe IROAD Q Series dashcams, which have fixed default wifi passwords, are vulnerable to device-pairing fatigue attacks because of a lack of rate limiting on the device-pairing process. An attacker connected to the network can flood the dashcam with pairing requests, repeatedly trigging device-pairing voice messages and inducing MFA fatigue. This can pressure drivers on the road into pressing the "Wi-Fi" button, granting the attacker full access for unauthorized control or data extraction. The POC screenshot in the advistory link shows the device-pairing request being replayed 5 times over a short window, with each replay triggering 3 voice messages broadcasting "Press the WiFi button to register the smartphone". This is then replayed indefinitely until the owner presses the wifi button.
Source⚠️ https://github.com/geo-chen/IROAD-V?tab=readme-ov-file#finding-8---mfa-spam-to-induce-device-pairing-fatigue
User
 geochen (UID 78995)
Submission06/24/2025 04:06 PM (23 days ago)
Moderation07/04/2025 02:34 PM (10 days later)
StatusAccepted
VulDB Entry314905 [IROAD Dashcam Q9 up to 20250624 MFA Pairing Request allocation of resources]
Points20

Do you need the next level of professionalism?

Upgrade your account now!