CVE-2025-65825

Source
https://cve.org/CVERecord?id=CVE-2025-65825
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-65825.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-65825
Published
2025-12-10T21:16:08.250Z
Modified
2026-03-13T03:41:21.651348Z
Severity
  • 4.6 (Medium) CVSS_V3 - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device, connect over UART, and retrieve the firmware dump for analysis. Within the NVS partition they may discover the credentials of the current and previous Wi-Fi networks. This information could be used to gain unauthorized access to the victim's Wi-Fi network.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "1.0.34.4"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-65825.json"