The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device, connect over UART, and retrieve the firmware dump for analysis. Within the NVS partition they may discover the credentials of the current and previous Wi-Fi networks. This information could be used to gain unauthorized access to the victim's Wi-Fi network.
References
| Link | Resource |
|---|---|
| https://gist.github.com/dead1nfluence/4dffc239b4a460f41a03345fd8e5feb5#file-flash-encryption-disabled-md | Third Party Advisory |
| https://github.com/dead1nfluence/Meatmeet-Pro-Vulnerabilities/blob/main/Device/Flash-Encryption-Disabled.md | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-10 21:16
Updated : 2025-12-30 19:15
NVD link : CVE-2025-65825
Mitre link : CVE-2025-65825
CVE.ORG link : CVE-2025-65825
JSON object : View
Products Affected
meatmeet
- meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
- meatmeet_pro_wifi_\&_bluetooth_meat_thermometer
CWE
CWE-311
Missing Encryption of Sensitive Data
