CVE-2025-65823
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-10

Last updated on: 2025-12-12

Assigner: MITRE

Description
The Meatmeet Pro was found to be shipped with hardcoded Wi-Fi credentials in the firmware, for the test network it was developed on. If an attacker retrieved this, and found the physical location of the Wi-Fi network, they could gain unauthorized access to the Wi-Fi network of the vendor. Additionally, if an attacker were located in close physical proximity to the device when it was first set up, they may be able to force the device to auto-connect to an attacker-controlled access point by setting the SSID and password to the same as which was found in the firmware file.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-10
Last Modified
2025-12-12
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
meatmeet pro *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-798 The product contains hard-coded credentials, such as a password or cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability involves the Meatmeet Pro device being shipped with hardcoded Wi-Fi credentials embedded in its firmware for a test network. An attacker who obtains these credentials and locates the physical Wi-Fi network could gain unauthorized access to the vendor's Wi-Fi. Additionally, if the attacker is physically near the device during initial setup, they might force the device to auto-connect to a malicious access point by using the same SSID and password found in the firmware.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to the vendor's Wi-Fi network, potentially exposing sensitive data or allowing further attacks within the network. It also allows an attacker in close physical proximity to redirect the device to connect to a malicious access point, which could be used to intercept or manipulate network traffic.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart