An issue was discovered on G-Net Dashcam BB GONX devices. Bypassing of Device Pairing can occur. It uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 01 Jul 2025 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Gnetsystem Gnetsystem g-onx Gnetsystem g-onx Firmware | |
| CPEs | cpe:2.3:h:gnetsystem:g-onx:-:*:*:*:*:*:*:* cpe:2.3:o:gnetsystem:g-onx_firmware:-:*:*:*:*:*:*:* | |
| Vendors & Products | Gnetsystem Gnetsystem g-onx Gnetsystem g-onx Firmware | 
Tue, 25 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-290 | |
| Metrics | cvssV3_1 
 
 | 
Tue, 18 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An issue was discovered on G-Net Dashcam BB GONX devices. Bypassing of Device Pairing can occur. It uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device. | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2025-03-18T00:00:00.000Z
Updated: 2025-03-25T15:32:49.933Z
Reserved: 2025-03-17T00:00:00.000Z
Link: CVE-2025-30142
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-03-25T15:32:46.192Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-03-18T20:15:26.777
Modified: 2025-07-01T21:04:36.893
Link: CVE-2025-30142
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow