Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20710: CWE-190 Integer Overflow in MediaTek, Inc. MT6890, MT7915, MT7916, MT7981, MT7986

0
High
VulnerabilityCVE-2025-20710cvecve-2025-20710cwe-190
Published: Tue Oct 14 2025 (10/14/2025, 09:11:34 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7915, MT7916, MT7981, MT7986

Description

In wlan AP driver, there is a possible out of bounds write due to an integer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418785; Issue ID: MSV-3515.

AI-Powered Analysis

AILast updated: 10/21/2025, 11:42:41 UTC

Technical Analysis

CVE-2025-20710 is an integer overflow vulnerability classified under CWE-190, found in the WLAN Access Point (AP) driver of several MediaTek chipsets including MT6890, MT7915, MT7916, MT7981, and MT7986. The issue arises when an integer overflow leads to an out-of-bounds write operation within the driver, potentially corrupting memory and enabling privilege escalation. This vulnerability can be exploited remotely by an attacker located within wireless range (proximal or adjacent), without requiring any authentication or user interaction, making it particularly dangerous in wireless network environments. The affected software versions include MediaTek SDK release 7.6.7.2 and earlier, and OpenWrt versions 19.07 and 21.02 for MT6890-based devices. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could gain elevated privileges, potentially leading to unauthorized access, data leakage, or denial of service. The CVSS v3.1 base score is 8.8, reflecting high severity with attack vector as adjacent network, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a critical concern for devices using these chipsets. MediaTek has assigned Patch ID WCNCR00418785 and Issue ID MSV-3515 for remediation, emphasizing the need for timely patching.

Potential Impact

For European organizations, this vulnerability poses a significant risk to wireless infrastructure relying on MediaTek chipsets in access points and routers. Exploitation could allow attackers within wireless range to escalate privileges on network devices, potentially leading to unauthorized network access, interception of sensitive data, or disruption of network services. This is especially critical for enterprises, public institutions, and service providers that depend on secure Wi-Fi connectivity. The compromise of network devices could facilitate lateral movement within corporate networks or enable persistent footholds for attackers. Additionally, critical infrastructure sectors such as transportation, healthcare, and manufacturing that use these chipsets in their wireless equipment may face operational disruptions or data breaches. The lack of required user interaction and authentication lowers the barrier for exploitation, increasing the threat level. Given the widespread use of OpenWrt-based devices in Europe and the presence of MediaTek chipsets in consumer and enterprise-grade equipment, the vulnerability could have broad implications if left unpatched.

Mitigation Recommendations

European organizations should immediately identify devices using the affected MediaTek chipsets (MT6890, MT7915, MT7916, MT7981, MT7986) and verify firmware versions, particularly those running SDK release 7.6.7.2 or earlier and OpenWrt 19.07 or 21.02. Applying the official patches provided by MediaTek (Patch ID WCNCR00418785) is critical to remediate the vulnerability. Network administrators should prioritize firmware updates on wireless access points and routers, especially those deployed in sensitive or high-risk environments. Where patching is not immediately possible, organizations should implement network segmentation to isolate vulnerable devices and restrict wireless access to trusted users only. Monitoring wireless network traffic for unusual activity or signs of exploitation attempts is recommended. Additionally, disabling unnecessary wireless services or features on affected devices can reduce the attack surface. Vendors and integrators should be engaged to ensure updated firmware is deployed promptly. Finally, organizations should review their wireless security policies and incident response plans to prepare for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.384Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee16307eab8b438c025d1f

Added to database: 10/14/2025, 9:21:52 AM

Last enriched: 10/21/2025, 11:42:41 AM

Last updated: 12/2/2025, 3:33:10 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats