{"uuid": "a466ce98-5fc2-4b34-acb0-06b648ee788f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30109", "type": "seen", "source": "https://t.me/cvedetector/20584", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30109 - IROAD Dashcam Hardcoded Credentials Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30109 \nPublished : March 18, 2025, 3:16 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : In the IROAD APK 5.2.5, there are Hardcoded Credentials in the APK for ports 9091 and 9092. The mobile application for the dashcam contains hardcoded credentials that allow an attacker on the local Wi-Fi network to access API endpoints and retrieve sensitive device information, including live and recorded footage. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T17:44:23.000000Z"}