{"uuid": "18fb344b-358e-47a0-9a05-7894627846a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2347", "type": "seen", "source": "https://t.me/cvedetector/20420", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2347 - IROAD Dash Cam FX2 Default Password Use Local Network Vulnerability (Authentication Bypass)\", \n  \"Content\": \"CVE ID : CVE-2025-2347 \nPublished : March 16, 2025, 9:15 p.m. | 2\u00a0hours, 4\u00a0minutes ago \nDescription : A vulnerability was found in IROAD Dash Cam FX2 up to 20250308 and classified as problematic. This issue affects some unknown processing of the component Device Registration. The manipulation of the argument Password with the input qwertyuiop leads to use of default password. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T00:44:21.000000Z"}