Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65820: n/a

0
Critical
VulnerabilityCVE-2025-65820cvecve-2025-65820
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Meatmeet Android Mobile Application 1.1.2.0. An exported activity can be spawned with the mobile application which opens a hidden page. This page, which is not available through the normal flows of the application, contains several devices which can be added to your account, two of which have not been publicly released. As a result of this vulnerability, the attacker can gain insight into unreleased Meatmeet devices.

AI-Powered Analysis

AILast updated: 12/17/2025, 22:10:45 UTC

Technical Analysis

CVE-2025-65820 is a critical security vulnerability identified in the Meatmeet Android Mobile Application version 1.1.2.0. The issue arises from an exported activity within the app that can be invoked externally, bypassing normal application flows. This activity opens a hidden page that is not accessible through the app’s standard user interface. The hidden page contains a list of devices that can be added to a user's account, including two devices that have not been publicly released. Because the activity is exported and lacks authentication or user interaction requirements, an attacker can directly spawn this activity and gain unauthorized access to sensitive information about unreleased Meatmeet devices. This constitutes an information disclosure vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability has a CVSS 3.1 base score of 9.8, reflecting its critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public patches or known exploits are currently documented, the exposure of unreleased device information can lead to intellectual property theft, competitive disadvantage, and potential targeted attacks leveraging this knowledge. The vulnerability highlights the risks of improperly secured exported components in mobile applications, especially those handling sensitive or proprietary data.

Potential Impact

For European organizations, the direct impact of this vulnerability primarily concerns companies involved with Meatmeet devices or their supply chain, including developers, distributors, and partners. The unauthorized disclosure of unreleased device information can lead to intellectual property theft, undermining competitive advantage and innovation efforts. This may also result in reputational damage and financial losses if leaked information is exploited by competitors or threat actors. Additionally, if attackers leverage the disclosed information to craft targeted attacks or malware, downstream impacts on confidentiality, integrity, and availability of connected systems could occur. Organizations relying on Meatmeet devices for IoT deployments or consumer services may face increased risk of compromise or service disruption. The vulnerability also serves as a cautionary example for European mobile app developers to rigorously audit exported components to prevent similar flaws. Given the critical severity and ease of exploitation without authentication, the threat demands urgent attention to prevent escalation and broader impact.

Mitigation Recommendations

To mitigate CVE-2025-65820, organizations should immediately audit the Meatmeet Android application and any similar apps for exported activities that expose sensitive functionality. Specifically, developers must: 1) Remove or restrict exported activities that are not intended for external invocation. 2) Implement strict access controls and authentication mechanisms on all exported components to ensure only authorized users can access sensitive pages or data. 3) Employ code obfuscation and secure coding practices to minimize information leakage. 4) Monitor application logs and network traffic for unusual activity indicative of exploitation attempts. 5) Coordinate with Meatmeet or relevant vendors to obtain patches or updated app versions addressing this vulnerability. 6) Conduct penetration testing focused on exported Android components to identify and remediate similar issues proactively. 7) Educate development teams on secure Android app design principles, especially regarding component exposure. These steps will help prevent unauthorized access to hidden application features and protect sensitive device information from disclosure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939dce9a97935729e77402b

Added to database: 12/10/2025, 8:49:45 PM

Last enriched: 12/17/2025, 10:10:45 PM

Last updated: 2/5/2026, 10:19:59 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats