As UART download mode is still enabled on the ESP32 chip on which the firmware runs, an adversary can dump the flash from the device and retrieve sensitive information such as details about the current and previous Wi-Fi network from the NVS partition. Additionally, this allows the adversary to reflash the device with their own firmware which may contain malicious modifications.
Metrics
Affected Vendors & Products
References
History
Wed, 21 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Meatmeet
Meatmeet meatmeet Pro Wifi \& Bluetooth Meat Thermometer Meatmeet meatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware |
|
| CPEs | cpe:2.3:h:meatmeet:meatmeet_pro_wifi_\&_bluetooth_meat_thermometer:-:*:*:*:*:*:*:* cpe:2.3:o:meatmeet:meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware:1.0.34.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Meatmeet
Meatmeet meatmeet Pro Wifi \& Bluetooth Meat Thermometer Meatmeet meatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware |
Thu, 11 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1191 | |
| Metrics |
cvssV3_1
|
Thu, 11 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Espressif
Espressif esp32 |
|
| Vendors & Products |
Espressif
Espressif esp32 |
Wed, 10 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | As UART download mode is still enabled on the ESP32 chip on which the firmware runs, an adversary can dump the flash from the device and retrieve sensitive information such as details about the current and previous Wi-Fi network from the NVS partition. Additionally, this allows the adversary to reflash the device with their own firmware which may contain malicious modifications. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-11T20:36:05.419Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65821
Updated: 2025-12-11T20:20:24.441Z
Status : Analyzed
Published: 2025-12-10T21:16:07.797
Modified: 2026-01-21T19:09:18.830
Link: CVE-2025-65821
No data.