Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access to the device can use a standard SPI programmer to extract the firmware using flashrom. This results in exposure of sensitive configuration data such as APN credentials, backend server information, and network parameter
References
| Link | Resource |
|---|---|
| https://github.com/NastyCrow/CVE-2025-51643 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-28 16:15
Updated : 2025-10-02 18:51
NVD link : CVE-2025-51643
Mitre link : CVE-2025-51643
CVE.ORG link : CVE-2025-51643
JSON object : View
Products Affected
meitrack
- t366l-g
- t366l-g_firmware
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
