The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device, connect over UART, and retrieve the firmware dump for analysis. Within the NVS partition they may discover the credentials of the current and previous Wi-Fi networks. This information could be used to gain unauthorized access to the victim's Wi-Fi network.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Meatmeet
Meatmeet meatmeet |
|
| Vendors & Products |
Meatmeet
Meatmeet meatmeet |
Thu, 11 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-311 | |
| Metrics |
cvssV3_1
|
Wed, 10 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device, connect over UART, and retrieve the firmware dump for analysis. Within the NVS partition they may discover the credentials of the current and previous Wi-Fi networks. This information could be used to gain unauthorized access to the victim's Wi-Fi network. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-11T20:35:34.867Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65825
No data.
Status : Received
Published: 2025-12-10T21:16:08.250
Modified: 2025-12-11T21:15:56.103
Link: CVE-2025-65825
No data.