Metrics
Affected Vendors & Products
No reference.
Fri, 09 May 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Metrics |
cvssV3_1
|
Fri, 09 May 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The app there makes it possible to inject any custom message (into existing mesh networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised. | DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-41722. Reason: This candidate is a reservation duplicate of CVE-2024-41722. Notes: All CVE users should reference CVE-2024-41722. instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. |
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 01 May 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1390 | |
Metrics |
ssvc
|
Thu, 01 May 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. The app there makes it possible to inject any custom message (into existing mesh networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised. | |
References |
| |
Metrics |
cvssV3_1
|

Status: REJECTED
Assigner: mitre
Published: 2025-05-01T00:00:00.000Z
Updated: 2025-05-09T19:52:22.759Z
Reserved: 2025-04-11T00:00:00.000Z
Link: CVE-2025-32883

Updated: 2025-05-01T19:46:36.767Z

Status : Rejected
Published: 2025-05-01T18:15:55.280
Modified: 2025-05-09T20:15:39.003
Link: CVE-2025-32883

No data.