Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 22 Jan 2026 04:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Meatmeet
Meatmeet meatmeet Pro Wifi \& Bluetooth Meat Thermometer Meatmeet meatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware |
|
| CPEs | cpe:2.3:h:meatmeet:meatmeet_pro_wifi_\&_bluetooth_meat_thermometer:-:*:*:*:*:*:*:* cpe:2.3:o:meatmeet:meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware:1.0.34.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Meatmeet
Meatmeet meatmeet Pro Wifi \& Bluetooth Meat Thermometer Meatmeet meatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware |
Fri, 12 Dec 2025 06:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1191 | |
| Metrics |
cvssV3_1
|
Fri, 12 Dec 2025 00:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Espressif
Espressif esp32 |
|
| Vendors & Products |
Espressif
Espressif esp32 |
Thu, 11 Dec 2025 05:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | As UART download mode is still enabled on the ESP32 chip on which the firmware runs, an adversary can dump the flash from the device and retrieve sensitive information such as details about the current and previous Wi-Fi network from the NVS partition. Additionally, this allows the adversary to reflash the device with their own firmware which may contain malicious modifications. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-11T20:36:05.419Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65821
Updated: 2025-12-11T20:20:24.441Z
Status : Analyzed
Published: 2025-12-10T21:16:07.797
Modified: 2026-01-21T19:09:18.830
Link: CVE-2025-65821
No data.
OpenCVE Enrichment
Updated: 2025-12-12T00:17:46Z