Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65825: n/a

0
Medium
VulnerabilityCVE-2025-65825cvecve-2025-65825
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device, connect over UART, and retrieve the firmware dump for analysis. Within the NVS partition they may discover the credentials of the current and previous Wi-Fi networks. This information could be used to gain unauthorized access to the victim's Wi-Fi network.

AI-Powered Analysis

AILast updated: 12/17/2025, 22:11:55 UTC

Technical Analysis

CVE-2025-65825 identifies a vulnerability in the Meatmeet basestation firmware where the firmware is stored without encryption. This lack of encryption allows an adversary with physical access to the device to disassemble it and connect to its UART interface to dump the firmware. Within the firmware's non-volatile storage (NVS) partition, the attacker can retrieve stored Wi-Fi credentials, including those of current and previous networks. These credentials are stored in plaintext, violating confidentiality principles. The vulnerability is classified under CWE-311 (Missing Encryption of Sensitive Data). The CVSS v3.1 score is 4.6 (medium severity), reflecting that exploitation requires physical access (AV:P), no privileges (PR:N), no user interaction (UI:N), and results in high confidentiality impact (C:H) but no integrity or availability impact (I:N/A:N). The vulnerability does not require authentication, but physical access is mandatory. No patches or known exploits are currently reported. The primary risk is unauthorized access to Wi-Fi networks, potentially enabling lateral movement or data exfiltration within the victim's network environment.

Potential Impact

For European organizations, the primary impact is the potential compromise of Wi-Fi network credentials, which can lead to unauthorized network access. This is particularly concerning for organizations with sensitive or critical operations relying on Meatmeet devices, as attackers could leverage the extracted credentials to infiltrate internal networks, bypassing perimeter defenses. The confidentiality breach could expose sensitive communications and data transmitted over the compromised Wi-Fi networks. Although the vulnerability does not directly affect system integrity or availability, the resulting network access could facilitate further attacks, including data theft, espionage, or lateral movement to critical systems. Organizations with devices deployed in publicly accessible or physically unprotected locations are at higher risk. The absence of encryption in firmware storage also indicates potential weaknesses in device security design, raising concerns about other undiscovered vulnerabilities.

Mitigation Recommendations

1. Physically secure Meatmeet devices to prevent unauthorized access or tampering, especially in public or shared spaces. 2. Implement strict access controls and surveillance around device deployment areas to detect and deter physical attacks. 3. Network segmentation should be employed to isolate Meatmeet devices and their associated Wi-Fi networks from critical infrastructure and sensitive data systems. 4. Regularly monitor network traffic for unusual access patterns or unauthorized connections that may indicate credential compromise. 5. Advocate for or request firmware updates from the vendor that implement encryption of firmware storage and secure handling of sensitive credentials. 6. Consider replacing or supplementing Meatmeet devices with alternatives that follow stronger security practices if firmware encryption is not forthcoming. 7. Educate staff about the risks of physical device access and enforce policies to report lost or tampered devices promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939dce9a97935729e774040

Added to database: 12/10/2025, 8:49:45 PM

Last enriched: 12/17/2025, 10:11:55 PM

Last updated: 2/5/2026, 9:18:21 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats