{"vulnerability": "CVE-2025-30132", "sightings": [{"uuid": "d19a825f-2f47-4926-9f07-8f6a7ebd77a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30132", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:28.000000Z"}, {"uuid": "449332c6-f8f5-462b-8630-d461b0cfcb47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30132", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkobiehzdu2h", "content": "", "creation_timestamp": "2025-03-18T18:13:39.798597Z"}, {"uuid": "ca487073-bd97-451f-9779-757893510c90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30132", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "639c13a7-366b-48b1-9ea0-4ed8c25d7207", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30132", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8340", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30132\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered on IROAD Dashcam V devices. It uses an unregistered public domain name as an internal domain, creating a security risk. During analysis, it was found that this domain was not owned by IROAD, allowing an attacker to register it and potentially intercept sensitive device traffic. If the dashcam or related services attempt to resolve this domain over the public Internet instead of locally, it could lead to data exfiltration or man-in-the-middle attacks.\n\ud83d\udccf Published: 2025-03-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T13:48:53.858Z\n\ud83d\udd17 References:\n1. https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-6-public-domain-used-for-internal-domain-name\n2. https://github.com/geo-chen/IROAD-V", "creation_timestamp": "2025-03-21T14:19:14.000000Z"}, {"uuid": "042f28b4-f963-49e1-b207-20fe111cfc90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30132", "type": "seen", "source": "https://t.me/cvedetector/20577", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30132 - IROAD Dashcam V DNS Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30132 \nPublished : March 18, 2025, 3:16 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : An issue was discovered on IROAD Dashcam V devices. It uses an unregistered public domain name as an internal domain, creating a security risk. During analysis, it was found that this domain was not owned by IROAD, allowing an attacker to register it and potentially intercept sensitive device traffic. If the dashcam or related services attempt to resolve this domain over the public Internet instead of locally, it could lead to data exfiltration or man-in-the-middle attacks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T17:44:11.000000Z"}]}