An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. All packets sent over RF are also sent over UART with USB Shell, allowing someone with local access to gain information about the protocol and intercept sensitive data.
References
Link | Resource |
---|---|
https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities | Third Party Advisory |
https://gotenna.com | Product |
Configurations
History
20 Jun 2025, 16:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://gotenna.com - Product | |
References | () https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities - Third Party Advisory | |
CPE | cpe:2.3:o:gotenna:mesh_firmware:0.25.5:*:*:*:*:*:*:* cpe:2.3:h:gotenna:mesh:-:*:*:*:*:*:*:* cpe:2.3:a:gotenna:gotenna:5.5.3:*:*:*:*:-:*:* |
|
First Time |
Gotenna
Gotenna mesh Gotenna mesh Firmware Gotenna gotenna |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
01 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 18:15
Updated : 2025-06-20 16:45
NVD link : CVE-2025-32886
Mitre link : CVE-2025-32886
JSON object : View
Products Affected
gotenna
- mesh_firmware
- gotenna
- mesh
CWE
No CWE.