Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access to the device can use a standard SPI programmer to extract the firmware using flashrom. This results in exposure of sensitive configuration data such as APN credentials, backend server information, and network parameter
History

Thu, 28 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics cvssV3_1

{'score': 2.4, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Description Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access to the device can use a standard SPI programmer to extract the firmware using flashrom. This results in exposure of sensitive configuration data such as APN credentials, backend server information, and network parameter
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-08-28T20:07:31.054Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-51643

cve-icon Vulnrichment

Updated: 2025-08-28T20:07:25.686Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-28T16:15:35.207

Modified: 2025-08-29T16:24:29.730

Link: CVE-2025-51643

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.