The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.
References
| Link | Resource |
|---|---|
| https://gist.github.com/dead1nfluence/4dffc239b4a460f41a03345fd8e5feb5#file-jtag-enabled-md | Third Party Advisory |
| https://github.com/dead1nfluence/Meatmeet-Pro-Vulnerabilities/blob/main/Device/JTAG-Enabled.md | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-10 21:16
Updated : 2026-01-21 19:08
NVD link : CVE-2025-65822
Mitre link : CVE-2025-65822
CVE.ORG link : CVE-2025-65822
JSON object : View
Products Affected
meatmeet
- meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
- meatmeet_pro_wifi_\&_bluetooth_meat_thermometer
CWE
CWE-1191
On-Chip Debug and Test Interface With Improper Access Control
