Vulnerability Description
An unauthenticated attacker within proximity of the Meatmeet device can issue several commands over Bluetooth Low Energy (BLE) to these devices which would result in a Denial of Service. These commands include: shutdown, restart, clear config. Clear config would disassociate the current device from its user and would require re-configuration to re-enable the device. As a result, the end user would be unable to receive updates from the Meatmeet base station which communicates with the cloud services until the device had been fixed or turned back on.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Meatmeet | Meatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware | 1.0.34.4 |
| Meatmeet | Meatmeet Pro Wifi \& Bluetooth Meat Thermometer | - |
Related Weaknesses (CWE)
References
- http://meatmeet.comProduct
- https://gist.github.com/dead1nfluence/4dffc239b4a460f41a03345fd8e5feb5#file-deniExploitThird Party Advisory
FAQ
What is CVE-2025-65828?
CVE-2025-65828 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An unauthenticated attacker within proximity of the Meatmeet device can issue several commands over Bluetooth Low Energy (BLE) to these devices which would result in a Denial of Service. These command...
How severe is CVE-2025-65828?
CVE-2025-65828 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65828?
Check the references section above for vendor advisories and patch information. Affected products include: Meatmeet Meatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware, Meatmeet Meatmeet Pro Wifi \& Bluetooth Meat Thermometer.