Title | IROAD Dashcam Q Series Protection Mechanism Failure |
---|
Description | The IROAD Q Series dashcams, which have fixed default wifi passwords, are vulnerable to device-pairing fatigue attacks because of a lack of rate limiting on the device-pairing process.
An attacker connected to the network can flood the dashcam with pairing requests, repeatedly trigging device-pairing voice messages and inducing MFA fatigue. This can pressure drivers on the road into pressing the "Wi-Fi" button, granting the attacker full access for unauthorized control or data extraction.
The POC screenshot in the advistory link shows the device-pairing request being replayed 5 times over a short window, with each replay triggering 3 voice messages broadcasting "Press the WiFi button to register the smartphone". This is then replayed indefinitely until the owner presses the wifi button.
|
---|
Source | ⚠️ https://github.com/geo-chen/IROAD-V?tab=readme-ov-file#finding-8---mfa-spam-to-induce-device-pairing-fatigue |
---|
User | geochen (UID 78995) |
---|
Submission | 06/24/2025 04:06 PM (23 days ago) |
---|
Moderation | 07/04/2025 02:34 PM (10 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 314905 [IROAD Dashcam Q9 up to 20250624 MFA Pairing Request allocation of resources] |
---|
Points | 20 |
---|