CVE-2025-32886

4.0 MEDIUM

📋 TL;DR

This vulnerability allows local attackers to intercept sensitive data transmitted by goTenna v1 devices. When packets are sent over RF, they are also transmitted over UART with USB Shell, exposing protocol information and potentially sensitive communications. This affects users of goTenna v1 devices with specific app and firmware versions.

💻 Affected Systems

Products:
  • goTenna v1 device
Versions: App version 5.5.3, Firmware version 0.25.5
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires physical access to the device's USB port. The vulnerability exists in the device firmware, not the mobile app.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access could intercept all RF communications, including sensitive messages, location data, and protocol details, potentially enabling further attacks on the mesh network.

🟠

Likely Case

Local attackers with brief physical access could capture some transmitted data, gaining insight into communications and potentially intercepting sensitive information.

🟢

If Mitigated

With proper physical security controls, the risk is minimal as attackers cannot access the USB port without physical device access.

🌐 Internet-Facing: LOW - This requires physical access to the device's USB port, not remote network access.
🏢 Internal Only: MEDIUM - Physical access to devices in uncontrolled environments could allow data interception.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access to connect to the USB port. The GitHub reference demonstrates the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://gotenna.com

Restart Required: No

Instructions:

No official patch available. Check goTenna website for firmware updates. Consider upgrading to newer goTenna models if available.

🔧 Temporary Workarounds

Disable USB Shell Access

all

Physically secure the USB port or disable USB shell functionality if supported by firmware

Physical Security Controls

all

Implement strict physical access controls to prevent unauthorized USB connections

🧯 If You Can't Patch

  • Physically secure devices to prevent unauthorized USB access
  • Consider retiring affected goTenna v1 devices and upgrading to newer models

🔍 How to Verify

Check if Vulnerable:

Check device firmware version (0.25.5) and app version (5.5.3) in goTenna app settings

Check Version:

Check version in goTenna mobile app settings under Device Information

Verify Fix Applied:

Monitor goTenna website for firmware updates and patch notes addressing CVE-2025-32886

📡 Detection & Monitoring

Log Indicators:

  • Unexpected USB connections to goTenna devices
  • Multiple failed authentication attempts on USB interface

Network Indicators:

  • Unusual USB traffic patterns from goTenna devices
  • Unexpected serial/UART communication

SIEM Query:

DeviceLogs WHERE device_type="goTenna" AND (event_type="USB_connection" OR interface="UART")

🔗 References

📤 Share & Export