An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.
Metrics
Affected Vendors & Products
References
History
Thu, 01 May 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1390 | |
Metrics |
ssvc
|
Thu, 01 May 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised. | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-05-01T00:00:00.000Z
Updated: 2025-05-01T19:28:49.157Z
Reserved: 2025-04-11T00:00:00.000Z
Link: CVE-2025-32885

Updated: 2025-05-01T19:28:25.423Z

Status : Awaiting Analysis
Published: 2025-05-01T18:15:55.593
Modified: 2025-05-02T13:52:51.693
Link: CVE-2025-32885

No data.