The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device, connect over UART, and retrieve the firmware dump for analysis. Within the NVS partition they may discover the credentials of the current and previous Wi-Fi networks. This information could be used to gain unauthorized access to the victim's Wi-Fi network.
History

Thu, 11 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Meatmeet
Meatmeet meatmeet
Vendors & Products Meatmeet
Meatmeet meatmeet

Thu, 11 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-311
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Wed, 10 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
Description The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device, connect over UART, and retrieve the firmware dump for analysis. Within the NVS partition they may discover the credentials of the current and previous Wi-Fi networks. This information could be used to gain unauthorized access to the victim's Wi-Fi network.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-11T20:35:34.867Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65825

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-10T21:16:08.250

Modified: 2025-12-11T21:15:56.103

Link: CVE-2025-65825

cve-icon Redhat

No data.