Software Secured Company Logo.
Services
Services
WEB, API & MOBILE SECURITY

Manual reviews expose logic flaws, chained exploits, and hidden vulnerabilities

Web Application Pentesting
Mobile Application Pentesting
Secure Code Review
Infrastructure & Cloud Security

Uncovers insecure networks, lateral movement, and segmentation gaps

External Network Pentesting
Internal Network Pentesting
Secure Cloud Review
AI, IoT & HARDWARE SECURITY

Specialized testing validates AI, IoT, and hardware security posture

AI Pentesting
IoT Pentesting
Hardware Pentesting
ADVANCED ADVERSARY SIMULATIONS

We simulate attackers, exposing systemic risks executives must address

Red Teaming
Social Engineering
Threat Modelling
PENETRATION TESTING AS A SERVICE

PTaaS provides continuous manual pentests, aligned with release cycles

Penetration Testing as a Service
OWASP TOP 10 TRAINING

Practical security training strengthens teams, shifting security left effectively

Secure Code Training
Ready to get started?
Identify real vulnerabilities confidently with zero-false-positive penetration testing
Learn More
Industries
Industries
INDUSTRIES
Data and AI

AI pentesting uncovers adversarial threats, ensuring compliance and investor trust

Healthcare

Penetration testing protects PHI, strengthens compliance, and prevents healthcare breaches

Finance

Manual pentests expose FinTech risks, securing APIs, cloud, and compliance

Security

Penetration testing validates SecurTech resilience, compliance, and customer trust

SaaS

Pentesting secures SaaS platforms, proving compliance and accelerating enterprise sales

CASE STUDY

“As custodians of digital assets, you should actually custodize assets, not outsource. Software Secured helped us prove that our custody technology truly delivers on that promise for our clients in both the cryptocurrency and traditional finance”

Nicolas Stalder,
CEO & Co-Founder, Cordial Systems
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Compliance
Compliance
COMPLIANCE
SOC 2 Penetration Testing

Pentesting validates SOC 2 controls, proving real security to auditors and customers

HIPAA Penetration Testing

Manual pentesting proves HIPAA controls protect PHI beyond documentation

ISO 27001 Penetration Testing

Pentests uncover risks audits miss, securing certification and enterprise trust

PCI DSS Penetration Testing

Pentesting validates PCI DSS controls, protecting sensitive cardholder data

GDPR Penetration Testing

GDPR-focused pentests reduce breach risk, regulatory fines, and reputational loss

CASE STUDY

“Software Secured’s comprehensive approach to penetration testing and mobile expertise led to finding more vulnerabilities than our previous vendors.”

Kevin Scully,
VP of Engineering, CompanyCam
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
PricingPortal
Resources
Resources
COMPLIANCE
Blogs
Case Studies
Events & Webinars
Partners
Customer Testimonials
News & Press
Whitepapers
API & Web Application Security Testing

The Highest Threat: The Hidden Weakness in Modern API & Web Application Security

Alexis Savard
November 21, 2025
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Login
Book a Consultation
Contact
Blog
/
Security Research
/
Hardware Security Research

Hacking the Meatmeet BBQ Probe — Part 1

We dismantled the Meatmeet Pro, monitored its BLE and network activity, and dumped the ESP32 flash for analysis.

By Julian B
・
8 min read
Table of contents
Text Link
Text Link

After completing our research on the Furbo 360 and Furbo Mini devices, we found ourselves looking for the next hardware hacking target. While perusing Amazon one evening we finally settled on a device: the Meatmeet Pro wireless meat thermometer. 

Device Tear Down 

The Meatmeet devices come in two parts: the base station and probe. The base station is what will be connected to your Wi-Fi network, allowing you to monitor the probe which is connected to the base station over Bluetooth Low Energy (BLE). 

Our first task was simple: tear it apart. We were able to deconstruct the base station device fairly quickly and gain access to the PCB. On this PCB we found a number of exposed test pads, the most important ones for our testing were TX, RX, and GND. These would allow us to monitor the device’s UART logs. We also discovered that the device was running on an ESP32-C3-1U mini chip.

Traffic Analysis and UART 

Our next step was to analyze the network traffic to and from the device. To do so, we used Matt Brown’s mitmrouter and fired up Wireshark, just as we had done in our Furbo research project. While watching Wireshark we also connected to the device over UART to get a better idea of what was going on. 

The UART logs were fairly verbose and allowed us to better understand what we saw on Wireshark—while the device was communicating with the AWS IoT server on port 443 it was doing so using MQTT and not over HTTPS as one might expect. Typically, MQTT connections are done over 1883 or 8883 so this was a bit of a surprise to us. 

Other than what we saw on UART, we had very little to go off of at this point. No services were exposed on the device and the only network protocol in use was MQTT.

Flash Dump 

While ESP32 binaries are notoriously challenging to reverse engineer, we decided to dump the flash and see what we could find out from the data stored on the device. In order to get the chip into a state which allows reading and writing we needed to enter the bootloader mode. To do so, we would have to “bring low” the IO9 test pad—this can be done by connecting the pad to ground. 

With our PCBite probes this was a fairly simple task. We could connect TX, RX, and GND, as per usual, to our Serial-USB adapter. Next, we connected the second GND pin on the probe to another probe touching IO9. It made for quite a mess of cables as we can see in the picture below. Given how small the chip is, it required very precise work.

Once this was done, all we needed to do was power up the device and we’d be able to run esptool to dump the flash.

ESP flash dumps are a bit more tricky to analyze than your regular firmware. Thankfully, Wilco Van Beijnum (wilco375) created the ESP Toolbox and documented how to use it in his talk, Breaking And Remaking ESP32 Devices: A Guide To Reverse Engineering And Patching. As it was our first time attempting to analyze an ESP32-based device it proved to be a very helpful resource, we highly recommend checking out both the toolbox and talk!

 Using espknife.py we parsed the flash file into its various segments.

These were written to the parsed directory, the contents of which can be seen below. From this we can see the flash contained several partitions: the bootloader, NVS, phy, ota_0, ota_1, and fctry. 

The Non-Volatile Storage (NVS) is where key-value pairs of data are stored on a device. Essentially, this is where whatever user-configured data a device may use in its operations is kept.

We decided to first try to see what strings (every reverse engineer's favourite tool) would return when run on the NVS partition. Lo and behold, we found the certificate and RSA private key used to authenticate to the MQTT server! 

We then ran Espressif’s nvs_tool.py on the NVS file to extract the contents into a more readable format that includes some additional context about each record. What we found was a ton of data, including our own previously configured Wi-Fi credentials, which is to be expected.  

What we didn’t expect was this: 

Within this NVS partition we found what is likely to be the Wi-Fi credentials of the company we determined to be the manufacturer of these devices. While they are in this “Bitmap State : Erased”, meaning they will eventually be removed, we were still able to find them in the dump before they were removed. They have been changed to this state as we have configured the device to connect to our own network, resulting in the previously configured credentials being moved to an erased state before being cleaned up later on. 

Unfortunately, their offices are located overseas so we can’t validate whether or not these actually work. 

espefuse

With Espressif’s espefuse we can review several of the security settings which may be enabled by developers. espefuse is a tool which facilitates the communication with Espressif chips, “for the purpose of reading/writing (“burning”) the one-time-programmable eFuses”. 

Once we put the device into the bootloader mode which we described earlier, we can run espefuse on the chip to retrieve a summary of the configurations. 

What we are interested in specifically are the Security Fuses, seen below. 

There are several misconfigurations we can identify based on this: 

  • Flash encryption is disabled. But we already knew this based on our analysis of the flash dump. 
  • Secure boot is disabled. 
  • Anti-rollback protection is set to disabled—this is indicated by the SECURE_VERSION flag being set to 0. 

MQTT

Keen readers, or those familiar with Espressif’s offerings, would have noticed the mention of Rainmaker in many of the MQTT calls shown in the UART logs. For us, it was a new technology. But our hopes of exploiting MQTT as we had with the Furbo were quickly dashed after doing a bit of research. Espressif offers ESP Rainmaker as a SaaS solution to vendors using the ESP32 chip as their base platform. The Rainmaker MQTT solution has a limited number of topics available to publish to, and even fewer to subscribe to. The full “API” docs can be found here. 

The access control mechanisms implemented for devices are quite strict. Each device is assigned a unique NodeID with which their RSA private key is associated. This meant that we could publish and subscribe but only as our device. Not nearly as interesting as being able to subscribe to the root topic of a MQTT server.

Here’s what it looks like once you’ve subscribed to the Rainmaker MQTT server:

Ping requests and ping responses are about as interesting as it gets. While it was a disappointment from a vulnerability research standpoint, it was highly interesting and something we would recommend if implementing MQTT on an ESP32. 

Moving on to the App

So far we have familiarized ourselves with the basic operations of the device, analyzed the UART output, dumped the flash and reviewed it. This will all prove to be instrumental in the next two parts of the hacking project. In part two we will turn our attention to the mobile application where we identify a handful of vulnerabilities through static and dynamic analysis. 

‍

About the author

Julian B

Julian is an intermediate penetration tester with nearly five years of experience working in cybersecurity, dedicated to penetration testing, open-source intelligence gathering, and moving the needle forward for organizations across Canada. He regularly engages with the community through presentations at conferences, on a range of topics including vulnerability research and OSINT investigations. This is work is underlined by several CVEs which have been attributed to his research on open-source applications.

Continue your reading with these value-packed posts

SOC 2 Penetration Testing

Do You Need Penetration Testing for Compliance?

Cate Callegari
Cate Callegari
10 min read
October 16, 2024
DevSecOps & Shift‑left Security

What do SAST, DAST, IAST and RASP Mean to Developers?

Sherif Koussa
Sherif Koussa
10 min read
November 2, 2018
Threat Modelling & Secure Design

How Threat Modeling Adds Value to a Penetration Test

Omkar Hiremath
Omkar Hiremath
9 min read
April 5, 2023

Get security insights straight to your inbox

Helping companies identify, understand, and solve their security gaps so their teams can sleep better at night

Book a Consultation
Centralize pentest progress in one place
Canadian based, trusted globally
Actionable remediation support, not just findings
Web, API, Mobile Security
Web App PentestingMobile App PentestingSecure Code Review
Infrastructure & Cloud Security
External Network PentestingInternal Network PentestingSecure Cloud Review
AI, IoT & Hardware Security
AI PentestingIoT PentestingHardware Pentesting
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
More Services
Pentesting as a ServiceSecure Code Training
Industries
Data and AIFinanceHealthcareSecuritySaaS
Compliance
GDPR PentestingHIPAA PentestingISO 27001 PentestingPCI DSS PentestingSOC 2 Pentesting
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
Security & CompliancePrivacy PolicyTerms & Conditions
2025 ©SoftwareSecured