An issue was discovered on goTenna v1 devices with app 5...
Moderate severity
Unreviewed
Published
May 2, 2025
to the GitHub Advisory Database
•
Updated May 2, 2025
Description
Published by the National Vulnerability Database
May 1, 2025
Published to the GitHub Advisory Database
May 2, 2025
Last updated
May 2, 2025
An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.
References