First published: Thu May 01 2025(Updated: )
An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The verification token used for sending SMS through a goTenna server is hardcoded in the app.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna App | ||
goTenna |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32889 is considered a high-severity vulnerability due to the hardcoded verification token for SMS transmission.
To fix CVE-2025-32889, update the goTenna app and firmware to the latest versions that address this security flaw.
CVE-2025-32889 may allow attackers to exploit the hardcoded verification token, potentially enabling unauthorized SMS transmissions.
CVE-2025-32889 specifically affects goTenna v1 devices running app version 5.5.3 and firmware version 0.25.5.
Users of goTenna v1 devices should promptly update to the patched app and firmware to mitigate the risks associated with CVE-2025-32889.