An unauthenticated attacker within proximity of the Meatmeet device can issue several commands over Bluetooth Low Energy (BLE) to these devices which would result in a Denial of Service. These commands include: shutdown, restart, clear config. Clear config would disassociate the current device from its user and would require re-configuration to re-enable the device. As a result, the end user would be unable to receive updates from the Meatmeet base station which communicates with the cloud services until the device had been fixed or turned back on.
References
| Link | Resource |
|---|---|
| http://meatmeet.com | Product |
| https://gist.github.com/dead1nfluence/4dffc239b4a460f41a03345fd8e5feb5#file-denial-of-service-ble-md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-10 21:16
Updated : 2025-12-30 19:01
NVD link : CVE-2025-65828
Mitre link : CVE-2025-65828
CVE.ORG link : CVE-2025-65828
JSON object : View
Products Affected
meatmeet
- meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
- meatmeet_pro_wifi_\&_bluetooth_meat_thermometer
CWE
CWE-306
Missing Authentication for Critical Function
