An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. All packets sent over RF are also sent over UART with USB Shell, allowing someone with local access to gain information about the protocol and intercept sensitive data.
References
Link | Resource |
---|---|
https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities | Third Party Advisory |
https://gotenna.com | Product |
Configurations
History
20 Jun 2025, 16:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities - Third Party Advisory | |
References | () https://gotenna.com - Product | |
CPE | cpe:2.3:o:gotenna:mesh_firmware:0.25.5:*:*:*:*:*:*:* cpe:2.3:h:gotenna:mesh:-:*:*:*:*:*:*:* cpe:2.3:a:gotenna:gotenna:5.5.3:*:*:*:*:-:*:* |
|
First Time |
Gotenna
Gotenna mesh Gotenna gotenna Gotenna mesh Firmware |
02 May 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 May 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-923 |
01 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 18:15
Updated : 2025-06-20 16:45
NVD link : CVE-2025-32886
Mitre link : CVE-2025-32886
CVE.ORG link : CVE-2025-32886
JSON object : View
Products Affected
gotenna
- gotenna
- mesh
- mesh_firmware
CWE
CWE-923
Improper Restriction of Communication Channel to Intended Endpoints