POC详情: 83ef23303c14cca57b57afb3d35c011e149ae75e

来源
关联漏洞
标题: Meitrack T366G-L GPS Tracker 安全漏洞 (CVE-2025-51643)
描述:Meitrack T366G-L GPS Tracker是中国美力高(Meitrack)公司的一款车载GPT定位器。 Meitrack T366G-L GPS Tracker存在安全漏洞,该漏洞源于SPI闪存芯片访问控制不当,可能导致敏感配置数据泄露。
介绍
# CVE-2025-51643: Unprotected SPI Flash Enables Firmware Extraction in Meitrack T366G-L

## Description
Meitrack T366G-L GPS Tracker devices contain an SPI flash chip (Winbond 25Q64JVSIQ) that is accessible without authentication or tamper protection. An attacker with physical access can attach a standard SPI programmer and use `flashrom` to extract the device firmware. This leads to exposure of sensitive configuration data - such as APN credentials, backend server information, and network parameters - stored in plaintext. The same access path also enables potential firmware modification and re-flashing.

## Affected Products
- **Vendor:** Meitrack Group  
- **Product:** Meitrack T366G-L  
- **Firmware:** T366L_Y24H131V039 (confirmed)

## Vulnerability Type
- **CWE-1191:** On-Chip Debug and Test Interface With Improper Access Control  
- **CWE-922 (related):** Insecure Storage of Sensitive Information

## Impact
- **Confidentiality:** High - full firmware and plaintext configuration disclosure (e.g., APN credentials).
- **Integrity:** Potential - attacker can modify and reflash firmware offline.
- **Availability:** None - no direct service disruption required.

## Affected Component
- **Hardware:** Winbond 25Q64JVSIQ SPI flash memory chip
- **Role:** Stores device firmware and configuration, including sensitive parameters in plaintext
- **Exposure:** Accessible via an unprotected/debug header/test pads on the PCB

## Attack Vectors
**Physical** - local access to the tracker hardware.

### Steps to Reproduce
1. **Disassemble** the T366G-L enclosure to access the PCB.  
2. **Identify** the SPI flash chip (Winbond 25Q64JVSIQ) and corresponding test pads/debug header.  
3. **Connect** a common SPI programmer (e.g., CH341A) with SOIC clip or wires to `VCC`, `GND`, `CS`, `CLK`, `MOSI`, `MISO`.  
4. **Dump firmware** using `flashrom`:
   ```bash
   # Example command (programmer may vary)
   sudo flashrom -p ch341a_spi -r meitrack_t366g-l.bin
## Discoverer
Hattan Hassan D Althobaiti

## References
- CWE-1191: https://cwe.mitre.org/data/definitions/1191.html
- CWE-922: https://cwe.mitre.org/data/definitions/922.html

## Mitigation
### For vendors (Meitrack):
 -Implement board-level protections (epoxy/potting, shield cans) and remove/disable debug pads on production units.
 -Enforce secure boot with signed firmware to prevent unauthorized reflashing.
 -Encrypt sensitive configuration at rest; avoid storing plaintext credentials.
 -Provide a provisioning flow that rotates secrets on first boot and supports remote credential updates.

### For operators:
 -Treat physical access as compromised: restrict device access, use tamper-evident seals.
 -Rotate backend credentials if device integrity is suspected.
 -Network-segment tracker infrastructure and enforce IP allow-lists/MFA on management endpoints.
文件快照

[4.0K] /data/pocs/83ef23303c14cca57b57afb3d35c011e149ae75e └── [2.8K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。