CVE-2025-65822

The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:meatmeet:meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware:1.0.34.4:*:*:*:*:*:*:*
cpe:2.3:h:meatmeet:meatmeet_pro_wifi_\&_bluetooth_meat_thermometer:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-10 21:16

Updated : 2026-01-21 19:08


NVD link : CVE-2025-65822

Mitre link : CVE-2025-65822

CVE.ORG link : CVE-2025-65822


JSON object : View

Products Affected

meatmeet

  • meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
  • meatmeet_pro_wifi_\&_bluetooth_meat_thermometer
CWE
CWE-1191

On-Chip Debug and Test Interface With Improper Access Control