goTenna Mesh, Information Disclosure, CVE-2025-32884 (Medium)

Listen to this Post

How the CVE Works

CVE-2025-32884 exposes sensitive user information in goTenna Mesh devices due to unencrypted Group ID (GID) transmission. By default, the GID is set to the user’s phone number unless manually opted out. The app fails to encrypt this GID in messages, allowing attackers intercepting communications to extract phone numbers. This vulnerability stems from insecure data handling in app version 5.5.3 and firmware 1.1.12, enabling potential identity linkage and privacy breaches.

DailyCVE Form

Platform: goTenna Mesh
Version: 5.5.3 (app), 1.1.12 (firmware)
Vulnerability: Information Disclosure
Severity: Medium
Date: 06/20/2025

Prediction: Patch expected by 08/2025

What Undercode Say

Analytics:

$ nmap -p 8080 --script http- <target_IP>
$ wireshark -k -i eth0 -Y "frame contains GID"

How Exploit

Intercept unencrypted GID via MITM attacks or packet sniffing. Extract phone numbers from exposed GID fields in transmitted messages.

Protection from this CVE

Disable phone number as GID. Update firmware/app. Use VPN.

Impact

Privacy breach, identity linkage, targeted attacks.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

πŸ’¬ Whatsapp | πŸ’¬ TelegramFeatured Image

Scroll to Top