2.4
CVE-2025-51643
- EPSS 0.02%
- Veröffentlicht 28.08.2025 00:00:00
- Zuletzt bearbeitet 02.10.2025 18:51:17
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access to the device can use a standard SPI programmer to extract the firmware using flashrom. This results in exposure of sensitive configuration data such as APN credentials, backend server information, and network parameter
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Meitrack ≫ T366l-g Firmware Versiont366l_y24h131v039
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.049 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2.4 | 0.9 | 1.4 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.