Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access to the device can use a standard SPI programmer to extract the firmware using flashrom. This results in exposure of sensitive configuration data such as APN credentials, backend server information, and network parameter
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/NastyCrow/CVE-2025-51643 |
![]() ![]() |
History
Thu, 28 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 | |
Metrics |
cvssV3_1
|
Thu, 28 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access to the device can use a standard SPI programmer to extract the firmware using flashrom. This results in exposure of sensitive configuration data such as APN credentials, backend server information, and network parameter | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-28T20:07:31.054Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-51643

Updated: 2025-08-28T20:07:25.686Z

Status : Awaiting Analysis
Published: 2025-08-28T16:15:35.207
Modified: 2025-08-29T16:24:29.730
Link: CVE-2025-51643

No data.

No data.