- Description
- An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. A command channel includes the next hop. which can be intercepted and used to break frequency hopping.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-319
- Hype score
- Not currently trending
CVE-2025-32887 An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. A command channel includes the next hop. which can be intercepted and used to break … https://t.co/Yz3hHA9qci
@CVEnew
3 May 2025
300 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-32887 🔴 HIGH (7.1) 🏢 Unknown Vendor - Unknown Product 🏗️ Unknown Version 🔗 https://t.co/y1OftZCaPG 🔗 https://t.co/aCe6LoMDcR #CyberCron #VulnAlert #InfoSec https://t.co/wU0RUmVZCo
@cybercronai
3 May 2025
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gotenna:mesh_firmware:0.25.5:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "92602326-09B2-46F8-ACB7-F977942C191D"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gotenna:mesh:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B188A17B-CCB4-438C-A370-5913AB3BB22A"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gotenna:gotenna:5.5.3:*:*:*:*:-:*:*",
"vulnerable": true,
"matchCriteriaId": "63D278BB-4BE6-4020-9D7C-CB774101087A"
}
],
"operator": "OR"
}
]
}
]