{"uuid": "c96075fd-8aaa-4ee0-a49f-0b73956ded95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30139", "type": "seen", "source": "https://t.me/cvedetector/20597", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30139 - G-Net Dashcam BB GONX Default Credentials Weak Wi-Fi Authentication\", \n  \"Content\": \"CVE ID : CVE-2025-30139 \nPublished : March 18, 2025, 8:15 p.m. | 23\u00a0minutes ago \nDescription : An issue was discovered on G-Net Dashcam BB GONX devices. Default credentials for SSID cannot be changed. It broadcasts a fixed SSID with default credentials that cannot be changed. This allows any nearby attacker to connect to the dashcam's network without restriction. Once connected, an attacker can sniff on connected devices such as the user's smartphone. The SSID is also always broadcasted. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T21:55:28.000000Z"}