CVE-2024-47127

MEDIUM

goTenna Pro App - Code Injection

Title source: llm
STIX 2.1

Description

In the goTenna Pro App there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing goTenna mesh networks. This vulnerability can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised. It is advised to share encryption keys via QR scanning for higher security operations and update your app to the current release for enhanced encryption protocols.

Scores

CVSS v3 6.5
EPSS 0.0006
EPSS Percentile 17.3%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-1390 CWE-287
Status published
Products (2)
gotenna/gotenna_pro < 1.6.1
gotenna/gotenna_pro < 2.0.3
Published Sep 26, 2024
Tracked Since Feb 18, 2026