Monday, March 10, 2025
HomeCVE/vulnerabilityThinkware Dashcam Vulnerability Leaks Credentials to Attackers

Thinkware Dashcam Vulnerability Leaks Credentials to Attackers

Published on

SIEM as a Service

Follow Us on Google News

A series of significant security vulnerabilities have been discovered in the Thinkware Dashcam, specifically the F800 Pro model, which could pose serious risks to users’ privacy and security.

These issues include unauthorized access to sensitive data, denial of service, and the ability to write malicious files. Below is a detailed overview of these vulnerabilities and their implications.

Overview of the Vulnerabilities

  1. CVE-2025-2119: Bypass of Device Pairing
    • Description: The authentication mechanism of the Thinkware Dashcam can be bypassed using default credentials. An attacker can connect to the dashcam’s WiFi without going through the Thinkware Cloud app, allowing unauthorized access to the RTSP feed and video recordings via telnet.
    • Impact: This could lead to the theft of sensitive video recordings without the user’s knowledge.
  2. CVE-2025-2122: Denial of Service (DoS)
    • Description: Since the dashcam only supports a single device connection at a time, an attacker could prevent the rightful owner from accessing the device.
    • Impact: This effectively creates a denial-of-service scenario for the legitimate user, potentially leading to security and convenience issues.
  3. CVE-2025-2120: User Credentials Saved in Plain-Text
    • Description: The credentials for the dashcam are stored in plain text in a configuration file, making them easily accessible to anyone with temporary physical access.
    • Impact: This negligence in security practices puts users’ account information at risk of being compromised.
  4. CVE-2025-2121: Unprotected Write Access
    • Description: Once connected to the dashcam, an attacker can write arbitrary files or malware into the device’s storage.
    • Impact: This could lead to the installation of malicious software or disruption of the device’s functionality.
  5. CVE-2024-53614: Hardcoded Decryption Key in Thinkware Cloud APK
    • Description: The Thinkware Cloud APK contains a hardcoded decryption key, which could allow attackers to access encrypted data and execute commands with elevated privileges.
    • Impact: This vulnerability poses a significant threat as it can compromise sensitive video footage stored on the cloud by allowing an attacker to intercept and decode login credentials.

Thinkware was notified about these vulnerabilities on November 12, 2024, via their vulnerability disclosure program.

The support team acknowledged the report and forwarded it to their mobile app development team for further evaluation. Despite these efforts, as of the latest update, no official fix has been released to address these issues.

The discovery of these vulnerabilities highlights the importance of robust security measures in IoT devices like dashcams.

Users of Thinkware’s F800 Pro dashcam are advised to take precautions such as changing default passwords and maintaining physical security of their devices.

Additionally, using strong and unique passwords for the Thinkware Cloud is crucial until a comprehensive patch is released.

As the security landscape continues to evolve, manufacturers must prioritize vulnerability testing and patching to protect user data and prevent potential misuse.

Users should remain vigilant about software updates and security advisories related to their devices to mitigate risks effectively.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Laravel Framework Flaw Allows Attackers to Execute Malicious JavaScript

A significant vulnerability has been identified in the Laravel framework, specifically affecting versions between...

Critical Vulnerabilities in Moxa Switches Enable Unauthorized Access

A critical vulnerability identified as CVE-2024-12297 has been discovered in Moxa's PT series of...

Cobalt Strike Exploitation by Hackers Drops, Report Reveals

A collaborative initiative involving Microsoft’s Digital Crimes Unit (DCU), Fortra, and the Health Information...

Developer Pleads Guilty to Injecting Malware and Crippling Company Systems

In a stunning case of corporate sabotage, a former software developer for Eaton Corp.,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Laravel Framework Flaw Allows Attackers to Execute Malicious JavaScript

A significant vulnerability has been identified in the Laravel framework, specifically affecting versions between...

Critical Vulnerabilities in Moxa Switches Enable Unauthorized Access

A critical vulnerability identified as CVE-2024-12297 has been discovered in Moxa's PT series of...

Cobalt Strike Exploitation by Hackers Drops, Report Reveals

A collaborative initiative involving Microsoft’s Digital Crimes Unit (DCU), Fortra, and the Health Information...