An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The app there makes it possible to inject any custom message (into existing mesh networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.
Metrics
Affected Vendors & Products
References
History
Thu, 01 May 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1390 | |
Metrics |
ssvc
|
Thu, 01 May 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The app there makes it possible to inject any custom message (into existing mesh networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised. | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-05-01T00:00:00.000Z
Updated: 2025-05-01T19:47:00.615Z
Reserved: 2025-04-11T00:00:00.000Z
Link: CVE-2025-32883

Updated: 2025-05-01T19:46:36.767Z

Status : Awaiting Analysis
Published: 2025-05-01T18:15:55.280
Modified: 2025-05-02T13:52:51.693
Link: CVE-2025-32883

No data.