An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Jun 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gotenna
Gotenna gotenna Gotenna mesh Gotenna mesh Firmware |
|
CPEs | cpe:2.3:a:gotenna:gotenna:5.5.3:*:*:*:*:-:*:* cpe:2.3:h:gotenna:mesh:-:*:*:*:*:*:*:* cpe:2.3:o:gotenna:mesh_firmware:0.25.5:*:*:*:*:*:*:* |
|
Vendors & Products |
Gotenna
Gotenna gotenna Gotenna mesh Gotenna mesh Firmware |
Thu, 01 May 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1390 | |
Metrics |
ssvc
|
Thu, 01 May 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised. | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-05-01T00:00:00.000Z
Updated: 2025-05-01T19:28:49.157Z
Reserved: 2025-04-11T00:00:00.000Z
Link: CVE-2025-32885

Updated: 2025-05-01T19:28:25.423Z

Status : Analyzed
Published: 2025-05-01T18:15:55.593
Modified: 2025-06-20T16:48:21.597
Link: CVE-2025-32885

No data.