Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

Posted on June 11, 2025June 11, 2025 By CWS

Jun 11, 2025Ravie LakshmananIoT Safety / Vulnerability
Two safety vulnerabilities have been disclosed in SinoTrack GPS units that could possibly be exploited to regulate sure distant features on linked automobiles and even observe their areas.
“Profitable exploitation of those vulnerabilities might enable an attacker to entry system profiles with out authorization via the frequent net administration interface,” the U.S. Cybersecurity and Infrastructure Safety Company (CISA) stated in an advisory.
“Entry to the system profile could enable an attacker to carry out some distant features on linked automobiles corresponding to monitoring the automobile location and disconnecting energy to the gasoline pump the place supported.”

The vulnerabilities, per the company, have an effect on all variations of the SinoTrack IoT PC Platform. A short description of the failings is under –

CVE-2025-5484 (CVSS rating: 8.3) – Weak authentication to the central SinoTrack system administration interface stems from the usage of a default password and a username that is an identifier printed on the receiver.
CVE-2025-5485 (CVSS rating: 8.6) – The username used to authenticate to the online administration interface, i.e., the identifier, is a numerical worth of not more than 10 digits.

An attacker might retrieve system identifiers with both bodily entry or by capturing identifiers from footage of the units posted on publicly accessible web sites corresponding to eBay. Moreover, the adversary might enumerate potential targets by incrementing or decrementing from recognized identifiers or via enumerating random digit sequences.
“As a consequence of its lack of safety, this system permits distant execution and management of the automobiles to which it’s linked and in addition steals delicate details about you and your automobiles,” safety researcher Raúl Ignacio Cruz Jiménez, who reported the failings to CISA, advised The Hacker Information in a press release.

There are at present no fixes that deal with the vulnerabilities. The Hacker Information has reached out to SinoTrack for remark, and we are going to replace the story if we hear again.
Within the absence of a patch, customers are suggested to alter the default password as quickly as attainable and take steps to hide the identifier. “If the sticker is seen on publicly accessible images, take into account deleting or changing the images to guard the identifier,” CISA stated.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Control, Default, Devices, GPS, Passwords, Remote, SinoTrack, Vehicle, Vulnerable

Post navigation

Previous Post: Microsoft Defender XDR New Advanced Hunting Tables for Email and Cloud Protections
Next Post: Chrome, Firefox Updates Resolve High-Severity Memory Bugs

Related Posts

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware The Hacker News
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access The Hacker News
3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026 3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026 The Hacker News
Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices The Hacker News
Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens The Hacker News
Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News