The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1191 | |
| Metrics |
cvssV3_1
|
Thu, 11 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Espressif
Espressif esp32 |
|
| Vendors & Products |
Espressif
Espressif esp32 |
Wed, 10 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-10T00:00:00.000Z
Updated: 2025-12-11T20:35:56.750Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65822
Updated: 2025-12-11T20:20:02.580Z
Status : Received
Published: 2025-12-10T21:16:07.910
Modified: 2025-12-11T21:15:55.577
Link: CVE-2025-65822
No data.