Description

An issue was discovered on G-Net Dashcam BB GONX devices. Bypassing of Device Pairing can occur. It uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device.

INFO

Published Date :

2025-03-18T00:00:00.000Z

Last Modified :

2025-03-25T15:32:49.933Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-30142 vulnerability.

Vendors Products
Gnetsystem
  • G-onx
  • G-onx Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-30142.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact