goTenna v1, Hardcoded Credentials Vulnerability, CVE-2025-32889 (Critical)

Listen to this Post

How the CVE Works:

The vulnerability in goTenna v1 devices (app v5.5.3, firmware v0.25.5) stems from a hardcoded verification token used for SMS transmission via goTenna servers. Since the token is embedded in the app, attackers can extract it and impersonate legitimate devices, enabling unauthorized SMS sending, data interception, or server abuse. This bypasses authentication mechanisms, as the fixed token cannot be revoked or rotated without a firmware update.

DailyCVE Form:

Platform: goTenna v1
Version: 5.5.3 (app), 0.25.5 (firmware)
Vulnerability: Hardcoded token
Severity: Critical
Date: 06/20/2025

Prediction: Patch by 08/2025

What Undercode Say:

strings gotenna_app | grep "verification_token"
adb pull /data/data/com.gotenna/app_token.key
curl -X POST -H "Token: HARDCODED_KEY" https://api.gotenna.com/sms_send

How Exploit:

Extract token via reverse engineering, replay in API requests.

Protection from this CVE:

Update firmware, implement dynamic token generation.

Impact:

Unauthorized SMS, server misuse.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top