Логотип exploitDog
bind:CVE-2025-32885
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-32885

Количество 2

Количество 2

nvd логотип

CVE-2025-32885

9 месяцев назад

An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-f5qp-wfgr-pm73

9 месяцев назад

An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-32885

An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.

CVSS3: 6.5
0%
Низкий
9 месяцев назад
github логотип
GHSA-f5qp-wfgr-pm73

An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.

CVSS3: 6.5
0%
Низкий
9 месяцев назад

Уязвимостей на страницу