Home

Description

The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device, connect over UART, and retrieve the firmware dump for analysis. Within the NVS partition they may discover the credentials of the current and previous Wi-Fi networks. This information could be used to gain unauthorized access to the victim's Wi-Fi network.

PUBLISHED Reserved 2025-11-18 | Published 2025-12-10 | Updated 2025-12-11 | Assigner mitre

References

github.com/.../blob/main/Device/Flash-Encryption-Disabled.md

gist.github.com/...nfluence/4dffc239b4a460f41a03345fd8e5feb5

cve.org (CVE-2025-65825)

nvd.nist.gov (CVE-2025-65825)

Download JSON