DriveThru Car Hacking
This talk demonstrates a multi-stage attack vector against automotive dashcams, leveraging insecure default configurations, weak device pairing, and exposed services to gain remote access. The researchers show how to bypass authentication, dump sensitive video and audio data, and perform remote code execution via web shell uploads. The presentation highlights the lack of security hygiene in IoT automotive devices and provides a framework for automated vulnerability discovery and exploitation. The researchers also discuss the privacy implications of cloud-synchronized dashcam feeds.
How to Pwn Automotive Dashcams via Insecure Cloud Sync and Weak Pairing
TLDR: Automotive dashcams often ship with hardcoded credentials, insecure pairing mechanisms, and exposed services that allow for remote code execution and unauthorized access to sensitive video feeds. Researchers demonstrated that by bypassing authentication and exploiting unauthenticated file upload endpoints, an attacker can gain root access to the device and pivot into the vehicle's internal network. Security teams and researchers should prioritize auditing these IoT devices for default configurations and lack of encrypted communication channels.
Automotive dashcams are no longer just passive recording devices. They have evolved into complex IoT nodes that bridge the gap between the vehicle's internal CAN bus and the public internet. While manufacturers market these features as "smart" connectivity, the reality is that many of these devices are essentially unhardened Linux servers sitting on your dashboard. The research presented at Black Hat 2025 on "DriveThru Car Hacking" confirms that the security hygiene of these devices is abysmal, turning a convenience feature into a massive privacy and safety liability.
The Anatomy of the Attack
The research highlights a multi-stage attack vector that exploits the entire lifecycle of a dashcam's connectivity. The attack begins with the discovery phase. Many dashcams broadcast their SSID, and because they often rely on weak or non-existent authentication for the initial pairing process, they are trivial to identify and connect to.
Once connected to the dashcam's local network, the researchers found that the device's web server often exposes sensitive endpoints without requiring any authentication. In several models, the researchers were able to bypass the device pairing process entirely by interacting directly with the HTTP server. This is a classic example of Broken Access Control, where the manufacturer assumes that physical proximity or network access is equivalent to authorization.
Technical Exploitation: From Web Shell to Root
The most critical finding involves the unauthenticated file upload vulnerability. By identifying a public-facing endpoint, such as /action/upload_file, the researchers were able to upload a CGI-based web shell. Once the shell is on the device, executing arbitrary commands becomes trivial.
The following command demonstrates how an attacker might verify the environment after gaining initial access:
# Verify the environment and gain basic system info
ifconfig
cat /etc/passwd
After gaining a foothold, the researchers moved to privilege escalation. By dumping the contents of /etc/shadow and /etc/passwd from the device's firmware, they were able to crack the root password offline. Since many of these devices share the same base Linux firmware, the credentials are often identical across entire product lines. Once root access is achieved, the attacker can disable battery protection, effectively causing a denial-of-service on the camera, or worse, use the camera as a pivot point to send arbitrary CAN bus messages to the vehicle's ECU.
Real-World Impact and Pivot Potential
For a penetration tester, these devices are a goldmine. If you are performing a red team engagement on a fleet of vehicles or even a single high-end car, the dashcam is a primary target for lateral movement. The impact is twofold: privacy and safety.
On the privacy front, the researchers demonstrated that cloud-synchronized feeds are often accessible to anyone with the mobile app, regardless of ownership. This means a malicious actor can view live video and audio from thousands of vehicles globally. On the safety front, the ability to inject CAN bus messages means an attacker could potentially manipulate vehicle functions if the infotainment system is not properly isolated from the powertrain.
The researchers used Nmap for service discovery and VLC to stream the RTSP feeds, proving that standard, off-the-shelf tools are sufficient to compromise these systems. They also utilized Kali Linux to manage the exploit chain, showing that no specialized hardware is required beyond a standard laptop and a Wi-Fi adapter.
Defensive Strategies for IoT Hardening
Defending against these attacks requires a shift in how we approach IoT security. Manufacturers must move away from "security by obscurity" and adopt a Secure by Design approach. This includes:
- Enforcing Unique Credentials: Hardcoded, shared passwords across a product line are a non-starter. Each device must ship with unique, randomized credentials.
- Mutual Authentication: Implement TLS 1.2 or 1.3 with mutual authentication for all cloud-to-device and app-to-device communications.
- Attack Surface Reduction: Disable all unnecessary services. If a device does not need an FTP or Telnet server, it should not be running one.
- Vulnerability Disclosure Programs: Manufacturers should establish a VDP to allow researchers to report findings before they are exploited in the wild.
The current state of dashcam security is a reminder that every connected device is a potential entry point. If you are a researcher, start looking at the mobile applications associated with these devices. The lack of proper certificate pinning and the reliance on insecure APIs are common patterns that lead to the kind of full-system compromise demonstrated in this research. Stop treating these devices as simple consumer electronics and start treating them as the networked computers they actually are.
Vulnerability Classes
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom




