Espressif

Esp32

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 10.12.2025 00:00:00
  • Zuletzt bearbeitet 21.01.2026 19:09:18

As UART download mode is still enabled on the ESP32 chip on which the firmware runs, an adversary can dump the flash from the device and retrieve sensitive information such as details about the current and previous Wi-Fi network from the NVS partitio...

  • EPSS 0.03%
  • Veröffentlicht 10.12.2025 00:00:00
  • Zuletzt bearbeitet 21.01.2026 19:08:19

The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device...

  • EPSS 0.05%
  • Veröffentlicht 10.12.2025 00:00:00
  • Zuletzt bearbeitet 30.12.2025 18:56:15

The ESP32 system on a chip (SoC) that powers the Meatmeet basestation device was found to lack Secure Boot. The Secure Boot feature ensures that only authenticated software can execute on the device. The Secure Boot process forms a chain of trust by ...

Medienbericht Exploit
  • EPSS 0.31%
  • Veröffentlicht 08.03.2025 20:15:36
  • Zuletzt bearbeitet 12.03.2025 14:58:54

Espressif ESP32 chips allow 29 hidden HCI commands, such as 0xFC02 (Write memory).