First published: Thu May 01 2025(Updated: )
An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna v1 devices | ||
goTenna v1 devices |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32885 has been classified with a high severity due to the potential for unauthorized message injection.
To mitigate CVE-2025-32885, ensure that your devices use encrypted communications and update to the latest firmware provided by the manufacturer.
CVE-2025-32885 affects goTenna v1 devices running app version 5.5.3 and firmware version 0.25.5.
Yes, CVE-2025-32885 can be exploited remotely if the device operates in an unencrypted environment.
CVE-2025-32885 is a message injection vulnerability that allows attackers to send custom messages within existing v1 networks.