Home

Description

The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.

PUBLISHED Reserved 2025-11-18 | Published 2025-12-10 | Updated 2025-12-11 | Assigner mitre

References

github.com/...lnerabilities/blob/main/Device/JTAG-Enabled.md

gist.github.com/...nfluence/4dffc239b4a460f41a03345fd8e5feb5

cve.org (CVE-2025-65822)

nvd.nist.gov (CVE-2025-65822)

Download JSON