The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device, connect over UART, and retrieve the firmware dump for analysis. Within the NVS partition they may discover the credentials of the current and previous Wi-Fi networks. This information could be used to gain unauthorized access to the victim's Wi-Fi network.
References
| Link | Resource |
|---|---|
| https://gist.github.com/dead1nfluence/4dffc239b4a460f41a03345fd8e5feb5#file-flash-encryption-disabled-md | Third Party Advisory |
| https://github.com/dead1nfluence/Meatmeet-Pro-Vulnerabilities/blob/main/Device/Flash-Encryption-Disabled.md | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Dec 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.github.com/dead1nfluence/4dffc239b4a460f41a03345fd8e5feb5#file-flash-encryption-disabled-md - Third Party Advisory | |
| References | () https://github.com/dead1nfluence/Meatmeet-Pro-Vulnerabilities/blob/main/Device/Flash-Encryption-Disabled.md - Third Party Advisory | |
| CPE | cpe:2.3:h:meatmeet:meatmeet_pro_wifi_\&_bluetooth_meat_thermometer:-:*:*:*:*:*:*:* cpe:2.3:o:meatmeet:meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware:1.0.34.4:*:*:*:*:*:*:* |
|
| First Time |
Meatmeet meatmeet Pro Wifi \& Bluetooth Meat Thermometer
Meatmeet meatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware Meatmeet |
11 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-311 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.6 |
10 Dec 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 21:16
Updated : 2025-12-30 19:15
NVD link : CVE-2025-65825
Mitre link : CVE-2025-65825
CVE.ORG link : CVE-2025-65825
JSON object : View
Products Affected
meatmeet
- meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
- meatmeet_pro_wifi_\&_bluetooth_meat_thermometer
CWE
CWE-311
Missing Encryption of Sensitive Data
