Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-20146: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2737, MT3603, MT6835, MT6878, MT6886, MT6897, MT6990, MT7902, MT7920, MT7922, MT8365, MT8518S, MT8532, MT8666, MT8667, MT8673, MT8755, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8796, MT8798, MT8893

0
High
VulnerabilityCVE-2024-20146cvecve-2024-20146cwe-787
Published: Mon Jan 06 2025 (01/06/2025, 03:17:49 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2737, MT3603, MT6835, MT6878, MT6886, MT6897, MT6990, MT7902, MT7920, MT7922, MT8365, MT8518S, MT8532, MT8666, MT8667, MT8673, MT8755, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8796, MT8798, MT8893

Description

In wlan STA driver, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389496 / ALPS09137491; Issue ID: MSV-1835.

AI-Powered Analysis

AILast updated: 02/26/2026, 21:34:00 UTC

Technical Analysis

CVE-2024-20146 is an out-of-bounds write vulnerability classified under CWE-787 found in the WLAN STA driver of multiple MediaTek chipsets, including MT2737, MT3603, MT6835, MT6878, MT6886, MT6897, MT6990, MT7902, MT7920, MT7922, MT8365, MT8518S, MT8532, MT8666, MT8667, MT8673, MT8755, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8796, MT8798, and MT8893. This vulnerability stems from improper input validation in the wireless driver, which allows an attacker within wireless range (proximal or adjacent) to perform a remote code execution attack without needing any privileges or user interaction. The vulnerability affects devices running Android versions 13.0 through 15.0, SDK release 2.5 and earlier, as well as embedded Linux distributions such as openWRT 23.05 and Yocto versions 3.3, 4.0, and 5.0. The CVSS v3.1 score is 8.1, indicating high severity, with an attack vector of adjacent network, low attack complexity, no privileges required, no user interaction, and impacts on integrity and availability. The flaw could allow attackers to overwrite memory out of bounds, potentially leading to arbitrary code execution or system crashes. While no exploits are currently known in the wild, the vulnerability poses a significant risk due to its ease of exploitation and broad device impact. Patches have been identified (WCNCR00389496 / ALPS09137491) but are not linked here. This vulnerability is particularly critical for devices relying on MediaTek chipsets for wireless connectivity, including smartphones, IoT devices, and embedded systems.

Potential Impact

The impact of CVE-2024-20146 is substantial for organizations worldwide that deploy devices using affected MediaTek chipsets. Successful exploitation can lead to remote code execution without authentication or user interaction, enabling attackers to take control of devices, disrupt services, or pivot within networks. This compromises the integrity and availability of affected systems, potentially causing device malfunctions, data corruption, or persistent malware infections. Enterprises relying on Android devices with these chipsets or embedded systems running openWRT or Yocto are at risk of operational disruption and data breaches. The proximity-based attack vector means that attackers need to be within wireless range, which could be exploited in public spaces, corporate offices, or industrial environments. The broad range of affected chipsets and software versions increases the attack surface, making it a critical concern for mobile operators, IoT deployments, and critical infrastructure sectors that use MediaTek-powered devices.

Mitigation Recommendations

1. Apply official patches from MediaTek and device manufacturers immediately once available to remediate the vulnerability. 2. Update affected devices to the latest Android versions or embedded Linux distributions that include the fix. 3. Implement network segmentation and wireless access controls to limit exposure to untrusted wireless networks and reduce the attack surface. 4. Employ wireless intrusion detection/prevention systems (WIDS/WIPS) to monitor and block suspicious wireless activity near critical assets. 5. Disable or restrict WLAN interfaces on devices where wireless connectivity is not essential. 6. For IoT and embedded devices, enforce strict firmware update policies and verify vendor updates promptly. 7. Educate security teams to monitor for unusual device behavior or crashes that could indicate exploitation attempts. 8. Collaborate with vendors to obtain timely security advisories and patches for affected products. 9. Conduct penetration testing and vulnerability assessments focusing on wireless attack vectors in environments with MediaTek devices. 10. Consider deploying endpoint detection and response (EDR) solutions capable of detecting anomalous code execution on affected devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2023-11-02T13:35:35.186Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a43c85912abc71d620d2

Added to database: 2/26/2026, 7:51:24 PM

Last enriched: 2/26/2026, 9:34:00 PM

Last updated: 2/26/2026, 11:18:52 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses