CVE-2025-20674: CWE-863 Incorrect Authorization in MediaTek, Inc. MT6890, MT6990, MT7915, MT7916, MT7981, MT7986, MT7990, MT7992, MT7993
In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303.
AI Analysis
Technical Summary
CVE-2025-20674 is a critical security vulnerability identified in several MediaTek wireless chipset models, including MT6890, MT6990, MT7915, MT7916, MT7981, MT7986, MT7990, MT7992, and MT7993. The flaw resides in the WLAN Access Point (AP) driver where an incorrect authorization check (CWE-863) allows an attacker to inject arbitrary packets. This vulnerability arises due to a missing permission check in the driver code, which means that an attacker can exploit this flaw remotely without requiring any prior authentication or user interaction. The exploit enables remote escalation of privilege, granting the attacker elevated access rights on the affected device. The CVSS v3.1 base score is 9.8, indicating a critical severity level, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning the attacker can fully compromise the device. The affected versions include SDK release 7.6.7.2 and earlier, as well as specific OpenWrt releases (19.07, 21.02 for MT6890 and 21.02, 23.05 for MT6990). Although no known exploits are reported in the wild yet, the vulnerability’s characteristics make it highly exploitable. The issue is tracked internally by MediaTek as MSV-3303 and patched under WCNCR00413202, though patch links are not provided in the data. This vulnerability could be leveraged to manipulate wireless traffic, disrupt network operations, or pivot into internal networks by injecting malicious packets, severely undermining network security.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially those relying on wireless infrastructure powered by MediaTek chipsets in routers, access points, or IoT devices. Successful exploitation could lead to complete compromise of network devices, allowing attackers to intercept, modify, or disrupt wireless communications. This can result in data breaches, unauthorized network access, lateral movement within corporate networks, and denial of service conditions. Critical sectors such as finance, healthcare, telecommunications, and government agencies are particularly at risk due to their reliance on secure wireless connectivity. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. Additionally, organizations using OpenWrt-based firmware on affected devices may be vulnerable if patches are not applied promptly. The vulnerability could also facilitate advanced persistent threats (APTs) aiming to establish persistent footholds in European networks. The potential for remote privilege escalation without user interaction makes this a highly dangerous threat that could be exploited at scale.
Mitigation Recommendations
European organizations should immediately identify and inventory all network devices utilizing the affected MediaTek chipsets, including routers, wireless access points, and IoT devices. It is critical to apply the official patches provided by MediaTek (WCNCR00413202) or firmware updates from device vendors that incorporate these fixes. For devices running OpenWrt, upgrading to versions beyond 23.05 (for MT6990) or later releases that include the patch is essential. Network administrators should implement strict network segmentation to isolate vulnerable wireless devices from critical infrastructure and sensitive data stores. Deploying network intrusion detection and prevention systems (IDS/IPS) with signatures tailored to detect anomalous packet injection attempts can help identify exploitation attempts. Additionally, organizations should monitor wireless network traffic for unusual patterns indicative of packet injection or privilege escalation activities. Employing strong wireless encryption standards (WPA3) and disabling unnecessary wireless services can reduce attack surface. Where patching is not immediately feasible, consider temporary mitigations such as disabling vulnerable wireless interfaces or restricting network access to trusted devices only. Regular vulnerability scanning and penetration testing focused on wireless infrastructure will help validate the effectiveness of mitigations.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20674: CWE-863 Incorrect Authorization in MediaTek, Inc. MT6890, MT6990, MT7915, MT7916, MT7981, MT7986, MT7990, MT7992, MT7993
Description
In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303.
AI-Powered Analysis
Technical Analysis
CVE-2025-20674 is a critical security vulnerability identified in several MediaTek wireless chipset models, including MT6890, MT6990, MT7915, MT7916, MT7981, MT7986, MT7990, MT7992, and MT7993. The flaw resides in the WLAN Access Point (AP) driver where an incorrect authorization check (CWE-863) allows an attacker to inject arbitrary packets. This vulnerability arises due to a missing permission check in the driver code, which means that an attacker can exploit this flaw remotely without requiring any prior authentication or user interaction. The exploit enables remote escalation of privilege, granting the attacker elevated access rights on the affected device. The CVSS v3.1 base score is 9.8, indicating a critical severity level, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning the attacker can fully compromise the device. The affected versions include SDK release 7.6.7.2 and earlier, as well as specific OpenWrt releases (19.07, 21.02 for MT6890 and 21.02, 23.05 for MT6990). Although no known exploits are reported in the wild yet, the vulnerability’s characteristics make it highly exploitable. The issue is tracked internally by MediaTek as MSV-3303 and patched under WCNCR00413202, though patch links are not provided in the data. This vulnerability could be leveraged to manipulate wireless traffic, disrupt network operations, or pivot into internal networks by injecting malicious packets, severely undermining network security.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially those relying on wireless infrastructure powered by MediaTek chipsets in routers, access points, or IoT devices. Successful exploitation could lead to complete compromise of network devices, allowing attackers to intercept, modify, or disrupt wireless communications. This can result in data breaches, unauthorized network access, lateral movement within corporate networks, and denial of service conditions. Critical sectors such as finance, healthcare, telecommunications, and government agencies are particularly at risk due to their reliance on secure wireless connectivity. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. Additionally, organizations using OpenWrt-based firmware on affected devices may be vulnerable if patches are not applied promptly. The vulnerability could also facilitate advanced persistent threats (APTs) aiming to establish persistent footholds in European networks. The potential for remote privilege escalation without user interaction makes this a highly dangerous threat that could be exploited at scale.
Mitigation Recommendations
European organizations should immediately identify and inventory all network devices utilizing the affected MediaTek chipsets, including routers, wireless access points, and IoT devices. It is critical to apply the official patches provided by MediaTek (WCNCR00413202) or firmware updates from device vendors that incorporate these fixes. For devices running OpenWrt, upgrading to versions beyond 23.05 (for MT6990) or later releases that include the patch is essential. Network administrators should implement strict network segmentation to isolate vulnerable wireless devices from critical infrastructure and sensitive data stores. Deploying network intrusion detection and prevention systems (IDS/IPS) with signatures tailored to detect anomalous packet injection attempts can help identify exploitation attempts. Additionally, organizations should monitor wireless network traffic for unusual patterns indicative of packet injection or privilege escalation activities. Employing strong wireless encryption standards (WPA3) and disabling unnecessary wireless services can reduce attack surface. Where patching is not immediately feasible, consider temporary mitigations such as disabling vulnerable wireless interfaces or restricting network access to trusted devices only. Regular vulnerability scanning and penetration testing focused on wireless infrastructure will help validate the effectiveness of mitigations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.371Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 683d16f6182aa0cae230af04
Added to database: 6/2/2025, 3:13:58 AM
Last enriched: 7/9/2025, 12:24:51 PM
Last updated: 8/12/2025, 4:08:47 PM
Views: 26
Related Threats
CVE-2025-33100: CWE-798 Use of Hard-coded Credentials in IBM Concert Software
MediumCVE-2025-33090: CWE-1333 Inefficient Regular Expression Complexity in IBM Concert Software
HighCVE-2025-27909: CWE-942 Permissive Cross-domain Policy with Untrusted Domains in IBM Concert Software
MediumCVE-2025-1759: CWE-244 Improper Clearing of Heap Memory Before Release ('Heap Inspection') in IBM Concert Software
MediumCVE-2025-4962: CWE-284 Improper Access Control in lunary-ai lunary-ai/lunary
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.