An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The app there makes it possible to inject any custom message (into existing mesh networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.
History

Thu, 01 May 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1390
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 01 May 2025 18:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The app there makes it possible to inject any custom message (into existing mesh networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AC:L/AV:A/A:N/C:H/I:N/PR:N/S:U/UI:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-05-01T00:00:00.000Z

Updated: 2025-05-01T19:47:00.615Z

Reserved: 2025-04-11T00:00:00.000Z

Link: CVE-2025-32883

cve-icon Vulnrichment

Updated: 2025-05-01T19:46:36.767Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-01T18:15:55.280

Modified: 2025-05-02T13:52:51.693

Link: CVE-2025-32883

cve-icon Redhat

No data.