CVE-2025-51643

Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access to the device can use a standard SPI programmer to extract the firmware using flashrom. This results in exposure of sensitive configuration data such as APN credentials, backend server information, and network parameter
References
Link Resource
https://github.com/NastyCrow/CVE-2025-51643 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:meitrack:t366l-g_firmware:t366l_y24h131v039:*:*:*:*:*:*:*
cpe:2.3:h:meitrack:t366l-g:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-08-28 16:15

Updated : 2025-10-02 18:51


NVD link : CVE-2025-51643

Mitre link : CVE-2025-51643

CVE.ORG link : CVE-2025-51643


JSON object : View

Products Affected

meitrack

  • t366l-g
  • t366l-g_firmware
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor