First published: Thu May 01 2025(Updated: )
An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The app there makes it possible to inject any custom message (into existing mesh networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna Mesh App | ||
goTenna Mesh Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32883 is considered a high severity vulnerability due to the potential for message injection in unencrypted networks.
To mitigate CVE-2025-32883, ensure that your goTenna devices are updated to the latest firmware and app versions and utilize encryption when communicating.
CVE-2025-32883 affects goTenna Mesh devices running app version 5.5.3 and firmware version 1.1.12.
CVE-2025-32883 can be exploited via software-defined radio to inject arbitrary messages into existing mesh networks.
Risks associated with CVE-2025-32883 include unauthorized message injection and potential disruption of communication in mesh networks.