CVE-2025-32885

An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:gotenna:mesh_firmware:0.25.5:*:*:*:*:*:*:*
cpe:2.3:h:gotenna:mesh:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:gotenna:gotenna:5.5.3:*:*:*:*:-:*:*

History

20 Jun 2025, 16:48

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 18:15

Updated : 2025-06-20 16:48


NVD link : CVE-2025-32885

Mitre link : CVE-2025-32885

CVE.ORG link : CVE-2025-32885


JSON object : View

Products Affected

gotenna

  • gotenna
  • mesh_firmware
  • mesh
CWE
CWE-1390

Weak Authentication