CVE-2025-65822

MEDIUM

Meatmeet Pro - Physical Access

Title source: llm
STIX 2.1

Description

The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.

Scores

CVSS v3 6.8
EPSS 0.0003
EPSS Percentile 7.5%
Attack Vector PHYSICAL
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-1191
Status published
Products (1)
meatmeet/meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware 1.0.34.4
Published Dec 10, 2025
Tracked Since Feb 18, 2026