CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “bluetooth”

41 vulnerabilities found for “bluetooth”

Page 1 of 3

CVE-2025-65822
MEDIUM6.8

The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial product an attacker with physical access to the device can connect over this port and reflash the device's firmware with malicious code which will be executed upon running. As a result, the victim will lose access to the functionality of their device and the attack may gain unauthorized access to the victim's Wi-Fi network by re-connecting to the SSID defined in the NVS partition of the device.

meatmeet / meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
Physical
Published Dec 10, 2025
Page 1 of 3
CVE-2025-65823
CRITICAL9.8

The Meatmeet Pro was found to be shipped with hardcoded Wi-Fi credentials in the firmware, for the test network it was developed on. If an attacker retrieved this, and found the physical location of the Wi-Fi network, they could gain unauthorized access to the Wi-Fi network of the vendor. Additionally, if an attacker were located in close physical proximity to the device when it was first set up, they may be able to force the device to auto-connect to an attacker-controlled access point by setting the SSID and password to the same as which was found in the firmware file.

meatmeet / meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
Network
Published Dec 10, 2025
CVE-2025-65824
HIGH8.8

An unauthenticated attacker within proximity of the Meatmeet device can perform an unauthorized Over The Air (OTA) firmware upgrade using Bluetooth Low Energy (BLE), resulting in the firmware on the device being overwritten with the attacker's code. As the device does not perform checks on upgrades, this results in Remote Code Execution (RCE) and the victim losing complete access to the Meatmeet.

meatmeet / meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
Adjacent
Published Dec 10, 2025
CVE-2025-65828
MEDIUM6.5

An unauthenticated attacker within proximity of the Meatmeet device can issue several commands over Bluetooth Low Energy (BLE) to these devices which would result in a Denial of Service. These commands include: shutdown, restart, clear config. Clear config would disassociate the current device from its user and would require re-configuration to re-enable the device. As a result, the end user would be unable to receive updates from the Meatmeet base station which communicates with the cloud services until the device had been fixed or turned back on.

meatmeet / meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
Adjacent
Published Dec 10, 2025
CVE-2025-65825
MEDIUM4.6

The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device, connect over UART, and retrieve the firmware dump for analysis. Within the NVS partition they may discover the credentials of the current and previous Wi-Fi networks. This information could be used to gain unauthorized access to the victim's Wi-Fi network.

meatmeet / meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
Physical
Published Dec 10, 2025
CVE-2025-65821
HIGH7.5

As UART download mode is still enabled on the ESP32 chip on which the firmware runs, an adversary can dump the flash from the device and retrieve sensitive information such as details about the current and previous Wi-Fi network from the NVS partition. Additionally, this allows the adversary to reflash the device with their own firmware which may contain malicious modifications.

meatmeet / meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmware
Network
Published Dec 10, 2025
CVE-2023-41093
LOW3.1

Use After Free vulnerability in Silicon Labs Bluetooth SDK on 32 bit, ARM may allow an attacker with precise timing capabilities to intercept a small number of packets intended for a recipient that has left the network.This issue affects Silabs Bluetooth SDK: through 8.0.0.

silabs / bluetooth_low_energy_software_development_kit
Adjacent
Published Jul 12, 2024
CVE-2023-2683
MEDIUM5.3

A memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 allows an attacker to send an invalid pairing message and cause future legitimate connection attempts to fail. A reset of the device immediately clears the error.

silabs / bluetooth_low_energy_software_development_kit
Adjacent
Published Jun 15, 2023
CVE-2022-45479
CRITICAL9.8

PC Keyboard allows remote unauthenticated users to send instructions to the server to execute arbitrary code without any previous authorization or authentication. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

beappsmobile / pc_keyboard_wifi\&bluetooth
Network
Published Dec 5, 2022
CVE-2022-45480
MEDIUM5.9

PC Keyboard WiFi & Bluetooth allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

beappsmobile / pc_keyboard_wifi_\&_bluetooth
Network
Published Dec 2, 2022
CVE-2020-26559
HIGH8.8

Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (participating in the provisioning protocol) to identify the AuthValue used given the Provisioner’s public key, and the confirmation number and nonce provided by the provisioning device. This could permit a device without the AuthValue to complete provisioning without brute-forcing the AuthValue.

bluetooth / mesh_profile+1
Adjacent
Published May 24, 2021
CVE-2020-26560
HIGH8.1

Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, reflecting the authentication evidence from a Provisioner, to complete authentication without possessing the AuthValue, and potentially acquire a NetKey and AppKey.

bluetooth / mesh_profile+1
Adjacent
Published May 24, 2021
CVE-2020-26556
HIGH7.5

Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, able to conduct a successful brute-force attack on an insufficiently random AuthValue before the provisioning procedure times out, to complete authentication by leveraging Malleable Commitment.

bluetooth / bluetooth_core_specification+2
Adjacent
Published May 24, 2021
CVE-2020-26557
HIGH7.5

Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (without possession of the AuthValue used in the provisioning protocol) to determine the AuthValue via a brute-force attack (unless the AuthValue is sufficiently random and changed each time).

bluetooth / mesh_profile+1
Adjacent
Published May 24, 2021
CVE-2020-15531
HIGH8.8

Silicon Labs Bluetooth Low Energy SDK before 2.13.3 has a buffer overflow via packet data. This is an over-the-air remote code execution vulnerability in Bluetooth LE in EFR32 SoCs and associated modules running Bluetooth SDK, supporting Central or Observer roles.

silabs / bluetooth_low_energy_software_development_kit
Adjacent
Published Aug 20, 2020
CVE-2020-15532
MEDIUM6.5

Silicon Labs Bluetooth Low Energy SDK before 2.13.3 has a buffer overflow via packet data. This is an over-the-air denial of service vulnerability in Bluetooth LE in EFR32 SoCs and associated modules running Bluetooth SDK, supporting Central or Observer roles.

silabs / bluetooth_low_energy_software_development_kit
Adjacent
Published Aug 20, 2020
CVE-2020-10135
MEDIUM5.4

Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.

bluetooth / bluetooth_core+2
Adjacent
Published May 19, 2020
CVE-2020-10134
MEDIUM6.3

Pairing in Bluetooth® Core v5.2 and earlier may permit an unauthenticated attacker to acquire credentials with two pairing devices via adjacent access when the unauthenticated user initiates different pairing methods in each peer device and an end-user erroneously completes both pairing procedures with the MITM using the confirmation number of one peer as the passkey of the other. An adjacent, unauthenticated attacker could be able to initiate any Bluetooth operation on either attacked device exposed by the enabled Bluetooth profiles. This exposure may be limited when the user must authorize certain access explicitly, but so long as a user assumes that it is the intended remote device requesting permissions, device-local protections may be weakened.

bluetooth / bluetooth_core+2
Adjacent
Published May 19, 2020
CVE-2020-9021
CRITICAL9.8

Post Oak AWAM Bluetooth Field Device 7400v2.08.21.2018, 7800SD.2015.1.16, 2011.3, 7400v2.02.01.2019, and 7800SD.2012.12.5 is vulnerable to injections of operating system commands through timeconfig.py via shell metacharacters in the htmlNtpServer parameter.

postoaktraffic / awam_bluetooth_field_device_firmware+4
Network
Published Feb 17, 2020
CVE-2018-5383
MEDIUM6.8

Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.

ti / wl18xx_bluetooth_service_pack+9
Adjacent
Published Aug 7, 2018