Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20708: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2025-20708cvecve-2025-20708cwe-787
Published: Mon Sep 01 2025 (09/01/2025, 05:12:16 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:29:58 UTC

Technical Analysis

CVE-2025-20708 is a critical security vulnerability classified under CWE-787 (Out-of-bounds Write) found in the modem firmware of numerous MediaTek chipsets, including MT2735 through MT8893 series. The root cause is an improper bounds check in the modem's code, which leads to writing data outside the intended memory buffer. This memory corruption can be remotely triggered when a user equipment (UE) connects to a maliciously controlled rogue base station. The attacker does not require any prior authentication or user interaction to exploit this flaw, making it particularly dangerous. Exploitation can result in remote escalation of privilege, potentially allowing the attacker to execute arbitrary code or disrupt modem operations, affecting confidentiality, integrity, and availability of the device. The vulnerability affects modem versions NR15, NR16, NR17, and NR17R, which are widely deployed in mobile devices globally. Despite no current public exploits, the vulnerability's nature and broad impact necessitate urgent attention. MediaTek has assigned Patch ID MOLY01123853 and Issue ID MSV-4131 to address this issue, though patch availability and deployment timelines are not specified. The CVSS v3.1 score of 8.8 reflects high severity, with attack vector being adjacent network (the cellular network), low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, but the impact on confidentiality, integrity, and availability is high. This vulnerability underscores the risks posed by rogue base stations and the critical need for secure modem firmware in mobile communications.

Potential Impact

The impact of CVE-2025-20708 is substantial for organizations and individuals relying on mobile devices with affected MediaTek modems. Successful exploitation can lead to full compromise of the modem's firmware, enabling attackers to escalate privileges remotely without user interaction. This can result in interception or manipulation of sensitive communications, disruption of cellular connectivity, and potential pivoting into other device components or networks. For enterprises, this could mean exposure of confidential corporate communications, disruption of mobile workforce connectivity, and increased risk of espionage or sabotage. For telecom operators, rogue base stations exploiting this vulnerability could undermine network integrity and customer trust. The broad range of affected chipsets, embedded in many smartphones, IoT devices, and other cellular-enabled hardware, amplifies the potential scale of impact globally. The absence of known exploits currently provides a window for mitigation, but the ease of exploitation and high severity score indicate that attackers could develop exploits rapidly once details become widespread.

Mitigation Recommendations

1. Apply official patches from MediaTek as soon as they become available, specifically addressing Patch ID MOLY01123853. 2. Coordinate with device manufacturers and mobile network operators to expedite firmware updates on affected devices. 3. Implement network-level detection and blocking of rogue base stations using advanced radio frequency monitoring and anomaly detection tools. 4. Encourage users to avoid connecting to untrusted or unknown cellular networks, especially in high-risk environments. 5. Employ mobile device management (MDM) solutions to enforce timely updates and monitor device security posture. 6. For critical infrastructure relying on cellular connectivity, consider deploying multi-factor authentication and encryption at higher protocol layers to mitigate potential data interception. 7. Monitor security advisories from MediaTek and related vendors for updates and additional mitigation guidance. 8. Conduct penetration testing and security assessments focusing on cellular network interfaces to identify potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.383Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b52c73ad5a09ad00c8fc2d

Added to database: 9/1/2025, 5:17:39 AM

Last enriched: 2/27/2026, 12:29:58 AM

Last updated: 3/24/2026, 6:17:54 AM

Views: 195

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses