CVE-2025-30127

An · An issue was discovered on Marbella Multiple Products

A critical vulnerability has been discovered in multiple Marbella dashcam products, rated 9.8 out of 10.

Executive summary

A critical vulnerability has been discovered in multiple Marbella dashcam products, rated 9.8 out of 10. This flaw allows unauthorized individuals to easily gain access to the devices using default or weak passwords, exposing highly sensitive video and audio recordings. Successful exploitation could lead to a severe breach of privacy, revealing confidential conversations, travel routes, and other sensitive information captured by the device.

Vulnerability

The vulnerability stems from inadequate credential management, allowing for authentication bypass. An attacker can gain administrative access to the dashcam's web interface or management service by using default credentials, guessing common passwords, or successfully brute-forcing weak passwords set by the user. Once authenticated, the attacker has full access to view, download, or delete stored video recordings, which may contain sensitive visual and audio data. The high CVSS score indicates this attack can likely be performed remotely over a network with low complexity.

Business impact

This vulnerability is of critical severity with a CVSS score of 9.8. Exploitation can lead to significant business and privacy impacts, including the compromise of confidential corporate information discussed within a vehicle, exposure of sensitive travel routes of executives or employees, and a severe breach of personal privacy. This could result in reputational damage, loss of customer trust, and potential legal and regulatory penalties related to data privacy violations. The stolen information could also be leveraged for corporate espionage, blackmail, or targeting of personnel.

Remediation

Immediate Action: Immediately apply the latest firmware update provided by Marbella to all affected dashcam devices. Before or after patching, ensure all default passwords are changed to strong, unique credentials. As a precautionary measure, review device access logs for any unauthorized or suspicious login activity originating from unknown IP addresses.

Proactive Monitoring: Configure network monitoring to detect and alert on unusual traffic patterns originating from affected dashcams, such as large data transfers to external IP addresses. System administrators should monitor for repeated failed login attempts followed by a successful login, which could indicate a brute-force attack.

Compensating Controls: If patching cannot be performed immediately, isolate the devices from the internet by placing them on a segmented network with strict firewall rules that only permit access from trusted management hosts. If the device's Wi-Fi hotspot feature is enabled, disable it or secure it with a strong WPA2/WPA3 password to prevent unauthorized local network access.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.8 and the trivial nature of exploitation, we recommend that this vulnerability be remediated with the highest priority. Organizations should immediately identify all vulnerable Marbella devices within their environment and deploy the vendor-supplied firmware update. Although this CVE is not currently listed on the CISA KEV list, its severity warrants immediate attention to prevent potential data breaches and protect sensitive corporate and personal information.