Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access to the device can use a standard SPI programmer to extract the firmware using flashrom. This results in exposure of sensitive configuration data such as APN credentials, backend server information, and network parameter
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/NastyCrow/CVE-2025-51643 |
![]() ![]() |
History
Tue, 09 Sep 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Meitrack
Meitrack t366g-l Meitrack t366g-l Firmware |
|
CPEs | cpe:2.3:h:meitrack:t366g-l:-:*:*:*:*:*:*:* cpe:2.3:o:meitrack:t366g-l_firmware:t366l_y24h131v039:*:*:*:*:*:*:* |
|
Vendors & Products |
Meitrack
Meitrack t366g-l Meitrack t366g-l Firmware |
Thu, 28 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 | |
Metrics |
cvssV3_1
|
Thu, 28 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access to the device can use a standard SPI programmer to extract the firmware using flashrom. This results in exposure of sensitive configuration data such as APN credentials, backend server information, and network parameter | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-08-28T00:00:00.000Z
Updated: 2025-08-28T20:07:31.054Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-51643

Updated: 2025-08-28T20:07:25.686Z

Status : Analyzed
Published: 2025-08-28T16:15:35.207
Modified: 2025-09-09T18:35:08.237
Link: CVE-2025-51643

No data.