| 제목 | IROAD Dashcam APK 5.2.5 Plaintext Password in Configuration File |
|---|
| 설명 | Hardcoded credentials in APK (IROAD <= v5.2.5) to ports 9091 and 9092 - The IROAD X5 mobile application (version 5.2.5 and below) contains hardcoded credentials that provide unauthorized access to the dashcam's API endpoints on ports 9091 and 9092:
a) Once IRoad SSID is connected to, the attacker sends a crafted authentication command with "TibetList" and "000000" to list settings of the dashcam at port 9091.
b) There's a separate set of credentials for port 9092 (stream) that is exposed in plaintext as well, "admin" + "tibet".
c) For settings, it's "adim" + "000000"
|
|---|
| 원천 | ⚠️ https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-2-hardcoded-credentials-in-apk-iroad--v525-to-ports-9091-and-9092 |
|---|
| 사용자 | geochen (UID 78995) |
|---|
| 제출 | 2025. 03. 02. PM 05:57 (1 년도 ago) |
|---|
| 모더레이션 | 2025. 03. 15. PM 07:22 (13 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 299808 [IROAD X5 Mobile App 까지 5.2.5 켜짐 Android API Endpoint 약한 인증] |
|---|
| 포인트들 | 20 |
|---|