MEDIUM · 6.8

CVE-2025-65822

The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device...

Vulnerability Description

The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.

CVSS Score

6.8

MEDIUM

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
MeatmeetMeatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware1.0.34.4
MeatmeetMeatmeet Pro Wifi \& Bluetooth Meat Thermometer-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2025-65822?

CVE-2025-65822 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device...

How severe is CVE-2025-65822?

CVE-2025-65822 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2025-65822?

Check the references section above for vendor advisories and patch information. Affected products include: Meatmeet Meatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware, Meatmeet Meatmeet Pro Wifi \& Bluetooth Meat Thermometer.