The ESP32 system on a chip (SoC) that powers the Meatmeet basestation device was found to lack Secure Boot. The Secure Boot feature ensures that only authenticated software can execute on the device. The Secure Boot process forms a chain of trust by verifying all mutable software entities involved in the Application Startup Flow. As a result, an attacker with physical access to the device can flash modified firmware to the device, resulting in the execution of malicious code upon startup.
History

Thu, 11 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Espressif
Espressif esp32
Vendors & Products Espressif
Espressif esp32

Wed, 10 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description The ESP32 system on a chip (SoC) that powers the Meatmeet basestation device was found to lack Secure Boot. The Secure Boot feature ensures that only authenticated software can execute on the device. The Secure Boot process forms a chain of trust by verifying all mutable software entities involved in the Application Startup Flow. As a result, an attacker with physical access to the device can flash modified firmware to the device, resulting in the execution of malicious code upon startup.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-12-10T00:00:00.000Z

Updated: 2025-12-11T20:09:25.004Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65829

cve-icon Vulnrichment

Updated: 2025-12-11T20:08:52.463Z

cve-icon NVD

Status : Received

Published: 2025-12-10T21:16:08.690

Modified: 2025-12-11T20:16:29.183

Link: CVE-2025-65829

cve-icon Redhat

No data.