Vulnerability Description
The mobile application insecurely handles information stored within memory. By performing a memory dump on the application after a user has logged out and terminated it, Wi-Fi credentials sent during the pairing process, JWTs used for authentication, and other sensitive details can be retrieved. As a result, an attacker with physical access to the device of a victim can retrieve this information and gain unauthorized access to their home Wi-Fi network and Meatmeet account.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Meatmeet | Meatmeet | 1.1.2.0 |
Related Weaknesses (CWE)
References
- https://gist.github.com/dead1nfluence/4dffc239b4a460f41a03345fd8e5feb5#file-sensThird Party Advisory
- https://github.com/dead1nfluence/Meatmeet-Pro-Vulnerabilities/blob/main/Mobile-AThird Party Advisory
FAQ
What is CVE-2025-65832?
CVE-2025-65832 is a vulnerability with a CVSS score of 4.6 (MEDIUM). The mobile application insecurely handles information stored within memory. By performing a memory dump on the application after a user has logged out and terminated it, Wi-Fi credentials sent during ...
How severe is CVE-2025-65832?
CVE-2025-65832 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65832?
Check the references section above for vendor advisories and patch information. Affected products include: Meatmeet Meatmeet.