Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20678: CWE-674 Uncontrolled Recursion in MediaTek, Inc. MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
Medium
VulnerabilityCVE-2025-20678cvecve-2025-20678cwe-674
Published: Mon Jun 02 2025 (06/02/2025, 02:29:47 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 08:51:32 UTC

Technical Analysis

CVE-2025-20678 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) found in the IMS service of multiple MediaTek modem chipsets, including but not limited to MT6739, MT6761, MT6762 series, MT6769 series, and many others. The flaw arises due to improper error handling within the IMS service, which leads to uncontrolled recursion and ultimately causes a system crash. This crash results in a denial of service condition on the affected device. The vulnerability can be triggered remotely without any user interaction or elevated privileges, provided the device connects to a rogue base station controlled by an attacker. The affected modem firmware versions include LR12A, LR13, NR15, NR16, NR17, and NR17R. The CVSS v3.1 score is 6.5 (medium severity), reflecting the ease of remote exploitation (attack vector: adjacent network), no required privileges or user interaction, and impact limited to availability (no confidentiality or integrity impact). The vulnerability is significant because it targets the IMS service, a critical component for voice and multimedia services over LTE and 5G networks. Disruption of IMS can degrade or halt telephony and data services on affected devices. Although no known exploits are currently reported in the wild, the broad range of affected chipsets and firmware versions indicates a large attack surface. MediaTek has assigned patch ID MOLY01394606 to address this issue, emphasizing the need for timely firmware updates.

Potential Impact

For European organizations, the primary impact of CVE-2025-20678 is the potential for remote denial of service on devices using affected MediaTek chipsets. This can disrupt mobile communications, including voice, SMS, and data services reliant on IMS, impacting both consumer and enterprise users. Telecommunications providers, emergency services, and critical infrastructure operators using devices with these chipsets could experience service outages or degraded network reliability. The vulnerability could be exploited by attackers deploying rogue base stations, which may be feasible in urban or high-value target areas. Disruption of mobile services can affect business continuity, emergency response, and operational communications. Additionally, enterprises with BYOD policies or mobile workforce relying on vulnerable devices may face increased risk of communication downtime. The lack of required user interaction or privileges lowers the barrier for exploitation, increasing the threat level in environments where rogue base stations can be deployed or encountered. However, the impact is limited to availability, with no direct compromise of data confidentiality or integrity.

Mitigation Recommendations

1. Immediate deployment of the official patch MOLY01394606 from MediaTek or device manufacturers incorporating this fix is critical. 2. Network operators should monitor for and mitigate rogue base stations using IMSI catchers or similar detection technologies to reduce exposure to attack vectors. 3. Enterprises should inventory devices to identify those with affected MediaTek chipsets and firmware versions and prioritize updates or device replacements. 4. Implement network-level anomaly detection to identify unusual IMS service disruptions or signaling patterns indicative of exploitation attempts. 5. Encourage users to avoid connecting to untrusted or unknown cellular networks, especially in sensitive or high-risk locations. 6. Collaborate with mobile network providers to ensure rapid dissemination of patches and security advisories. 7. For critical infrastructure, consider deploying multi-factor communication channels to maintain operational continuity if mobile services are disrupted. 8. Regularly update device firmware and baseband software as part of a comprehensive mobile device management strategy.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.371Z
Cvss Version
null
State
PUBLISHED

Threat ID: 683d16f6182aa0cae230af0c

Added to database: 6/2/2025, 3:13:58 AM

Last enriched: 2/18/2026, 8:51:32 AM

Last updated: 3/25/2026, 4:15:15 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses