CVE-2025-32882

An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app uses a custom implementation of encryption without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:gotenna:mesh_firmware:0.25.5:*:*:*:*:*:*:*
cpe:2.3:h:gotenna:mesh:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:gotenna:gotenna:5.5.3:*:*:*:*:-:*:*

History

20 Jun 2025, 16:52

Type Values Removed Values Added
CPE cpe:2.3:o:gotenna:mesh_firmware:0.25.5:*:*:*:*:*:*:*
cpe:2.3:h:gotenna:mesh:-:*:*:*:*:*:*:*
cpe:2.3:a:gotenna:gotenna:5.5.3:*:*:*:*:-:*:*
References () https://gotenna.com - () https://gotenna.com - Product
References () https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities - () https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities - Third Party Advisory
First Time Gotenna
Gotenna mesh
Gotenna mesh Firmware
Gotenna gotenna
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

01 May 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 18:15

Updated : 2025-06-20 16:52


NVD link : CVE-2025-32882

Mitre link : CVE-2025-32882


JSON object : View

Products Affected

gotenna

  • mesh_firmware
  • gotenna
  • mesh
CWE

No CWE.