{"uuid": "93f4a9d5-c3da-41df-afb7-9f331b8664d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32885", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14359", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32885\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AC:L/AV:A/A:N/C:H/I:N/PR:N/S:U/UI:N)\n\ud83d\udd39 Description: An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.\n\ud83d\udccf Published: 2025-05-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-01T17:48:46.511Z\n\ud83d\udd17 References:\n1. https://gotenna.com\n2. https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities", "creation_timestamp": "2025-05-01T18:15:55.000000Z"}