CVE-2025-65826
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-10

Last updated on: 2025-12-30

Assigner: MITRE

Description
The mobile application was found to contain stored credentials for the network it was developed on. If an attacker retrieved this, and found the physical location of the Wi-Fi network, they could gain unauthorized access to the Wi-Fi network of the vendor. Additionally, if an attacker were located in close physical proximity to the device when it was first set up, they may be able to force the device to auto-connect to an attacker-controlled access point by setting the SSID and password to the same as which was found in the firmware file.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-10
Last Modified
2025-12-30
Generated
2026-05-07
AI Q&A
2025-12-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
meatmeet meatmeet 1.1.2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-312 The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves a mobile application that contains stored credentials for the network it was developed on. An attacker who retrieves these credentials and locates the physical Wi-Fi network could gain unauthorized access. Additionally, if an attacker is physically near the device during its initial setup, they could force the device to auto-connect to a malicious access point by mimicking the SSID and password found in the firmware.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized access to the vendor's Wi-Fi network, potentially allowing attackers to intercept network traffic, access sensitive information, or launch further attacks within the network. It also risks the device connecting to a malicious access point controlled by an attacker, which could compromise device security and data integrity.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately remove any stored credentials from the mobile application and firmware. Ensure that the device does not auto-connect to unknown or attacker-controlled access points by verifying and changing the SSID and password settings. Additionally, restrict physical access to the device during setup to prevent attackers from forcing auto-connections to malicious access points.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart