Vulnerability Description
The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Meatmeet | Meatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware | 1.0.34.4 |
| Meatmeet | Meatmeet Pro Wifi \& Bluetooth Meat Thermometer | - |
Related Weaknesses (CWE)
References
- https://gist.github.com/dead1nfluence/4dffc239b4a460f41a03345fd8e5feb5#file-jtagThird Party Advisory
- https://github.com/dead1nfluence/Meatmeet-Pro-Vulnerabilities/blob/main/Device/JThird Party Advisory
FAQ
What is CVE-2025-65822?
CVE-2025-65822 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device...
How severe is CVE-2025-65822?
CVE-2025-65822 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65822?
Check the references section above for vendor advisories and patch information. Affected products include: Meatmeet Meatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware, Meatmeet Meatmeet Pro Wifi \& Bluetooth Meat Thermometer.