First published: Thu May 01 2025(Updated: )
An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The verification token used for sending SMS through a goTenna server is hardcoded in the app.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna Mesh Firmware | ||
goTenna v1 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32888 has been classified as a medium severity vulnerability due to the potential for exploitation through hardcoded SMS verification tokens.
To fix CVE-2025-32888, update the goTenna Mesh app and firmware to the latest versions that remove the hardcoded verification token.
CVE-2025-32888 affects goTenna Mesh devices running app version 5.5.3 and firmware version 1.1.12.
The impact of CVE-2025-32888 is that an attacker could potentially send SMS messages impersonating the goTenna user, compromising user confidentiality.
There are currently no documented workarounds for CVE-2025-32888 other than applying the necessary updates from goTenna.