{"uuid": "238772f9-c437-4025-b9fa-6773b4595cef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21608", "type": "seen", "source": "https://t.me/cvedetector/18343", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21608 - Meshtastic MQTT PKC Decoding Vulnerability (Authentication Bypass)\", \n  \"Content\": \"CVE ID : CVE-2025-21608 \nPublished : Feb. 18, 2025, 7:15 p.m. | 39\u00a0minutes ago \nDescription : Meshtastic is an open source mesh networking solution. In affected firmware versions crafted packets over MQTT are able to appear as a DM in client to a node even though they were not decoded with PKC. This issue has been addressed in version 2.5.19 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T20:59:40.000000Z"}