The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 11 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1191
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Espressif
Espressif esp32
Vendors & Products Espressif
Espressif esp32

Wed, 10 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
Description The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-11T20:35:56.750Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65822

cve-icon Vulnrichment

Updated: 2025-12-11T20:20:02.580Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-10T21:16:07.910

Modified: 2025-12-12T15:18:13.390

Link: CVE-2025-65822

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-11T15:17:33Z

Weaknesses