Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6jw6-77q7-32wq

Опубликовано: 10 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.8

Описание

The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.

The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.

EPSS

Процентиль: 8%
0.00031
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-1191

Связанные уязвимости

CVSS3: 6.8
nvd
около 2 месяцев назад

The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.

EPSS

Процентиль: 8%
0.00031
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-1191