CVE-2025-65829

The ESP32 system on a chip (SoC) that powers the Meatmeet basestation device was found to lack Secure Boot. The Secure Boot feature ensures that only authenticated software can execute on the device. The Secure Boot process forms a chain of trust by verifying all mutable software entities involved in the Application Startup Flow. As a result, an attacker with physical access to the device can flash modified firmware to the device, resulting in the execution of malicious code upon startup.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:meatmeet:meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware:1.0.34.4:*:*:*:*:*:*:*
cpe:2.3:h:meatmeet:meatmeet_pro_wifi_\&_bluetooth_meat_thermometer:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-10 21:16

Updated : 2025-12-30 18:56


NVD link : CVE-2025-65829

Mitre link : CVE-2025-65829

CVE.ORG link : CVE-2025-65829


JSON object : View

Products Affected

meatmeet

  • meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
  • meatmeet_pro_wifi_\&_bluetooth_meat_thermometer
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')