CVE-2025-20710: CWE-190 Integer Overflow in MediaTek, Inc. MT6890, MT7915, MT7916, MT7981, MT7986
In wlan AP driver, there is a possible out of bounds write due to an integer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418785; Issue ID: MSV-3515.
AI Analysis
Technical Summary
CVE-2025-20710 is an integer overflow vulnerability classified under CWE-190, found in the WLAN Access Point (AP) driver of several MediaTek chipsets including MT6890, MT7915, MT7916, MT7981, and MT7986. The issue arises when an integer overflow leads to an out-of-bounds write operation within the driver, potentially corrupting memory and enabling privilege escalation. This vulnerability can be exploited remotely by an attacker located within wireless range (proximal or adjacent), without requiring any authentication or user interaction, making it particularly dangerous in wireless network environments. The affected software versions include MediaTek SDK release 7.6.7.2 and earlier, and OpenWrt versions 19.07 and 21.02 for MT6890-based devices. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could gain elevated privileges, potentially leading to unauthorized access, data leakage, or denial of service. The CVSS v3.1 base score is 8.8, reflecting high severity with attack vector as adjacent network, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a critical concern for devices using these chipsets. MediaTek has assigned Patch ID WCNCR00418785 and Issue ID MSV-3515 for remediation, emphasizing the need for timely patching.
Potential Impact
For European organizations, this vulnerability poses a significant risk to wireless infrastructure relying on MediaTek chipsets in access points and routers. Exploitation could allow attackers within wireless range to escalate privileges on network devices, potentially leading to unauthorized network access, interception of sensitive data, or disruption of network services. This is especially critical for enterprises, public institutions, and service providers that depend on secure Wi-Fi connectivity. The compromise of network devices could facilitate lateral movement within corporate networks or enable persistent footholds for attackers. Additionally, critical infrastructure sectors such as transportation, healthcare, and manufacturing that use these chipsets in their wireless equipment may face operational disruptions or data breaches. The lack of required user interaction and authentication lowers the barrier for exploitation, increasing the threat level. Given the widespread use of OpenWrt-based devices in Europe and the presence of MediaTek chipsets in consumer and enterprise-grade equipment, the vulnerability could have broad implications if left unpatched.
Mitigation Recommendations
European organizations should immediately identify devices using the affected MediaTek chipsets (MT6890, MT7915, MT7916, MT7981, MT7986) and verify firmware versions, particularly those running SDK release 7.6.7.2 or earlier and OpenWrt 19.07 or 21.02. Applying the official patches provided by MediaTek (Patch ID WCNCR00418785) is critical to remediate the vulnerability. Network administrators should prioritize firmware updates on wireless access points and routers, especially those deployed in sensitive or high-risk environments. Where patching is not immediately possible, organizations should implement network segmentation to isolate vulnerable devices and restrict wireless access to trusted users only. Monitoring wireless network traffic for unusual activity or signs of exploitation attempts is recommended. Additionally, disabling unnecessary wireless services or features on affected devices can reduce the attack surface. Vendors and integrators should be engaged to ensure updated firmware is deployed promptly. Finally, organizations should review their wireless security policies and incident response plans to prepare for potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2025-20710: CWE-190 Integer Overflow in MediaTek, Inc. MT6890, MT7915, MT7916, MT7981, MT7986
Description
In wlan AP driver, there is a possible out of bounds write due to an integer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418785; Issue ID: MSV-3515.
AI-Powered Analysis
Technical Analysis
CVE-2025-20710 is an integer overflow vulnerability classified under CWE-190, found in the WLAN Access Point (AP) driver of several MediaTek chipsets including MT6890, MT7915, MT7916, MT7981, and MT7986. The issue arises when an integer overflow leads to an out-of-bounds write operation within the driver, potentially corrupting memory and enabling privilege escalation. This vulnerability can be exploited remotely by an attacker located within wireless range (proximal or adjacent), without requiring any authentication or user interaction, making it particularly dangerous in wireless network environments. The affected software versions include MediaTek SDK release 7.6.7.2 and earlier, and OpenWrt versions 19.07 and 21.02 for MT6890-based devices. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could gain elevated privileges, potentially leading to unauthorized access, data leakage, or denial of service. The CVSS v3.1 base score is 8.8, reflecting high severity with attack vector as adjacent network, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a critical concern for devices using these chipsets. MediaTek has assigned Patch ID WCNCR00418785 and Issue ID MSV-3515 for remediation, emphasizing the need for timely patching.
Potential Impact
For European organizations, this vulnerability poses a significant risk to wireless infrastructure relying on MediaTek chipsets in access points and routers. Exploitation could allow attackers within wireless range to escalate privileges on network devices, potentially leading to unauthorized network access, interception of sensitive data, or disruption of network services. This is especially critical for enterprises, public institutions, and service providers that depend on secure Wi-Fi connectivity. The compromise of network devices could facilitate lateral movement within corporate networks or enable persistent footholds for attackers. Additionally, critical infrastructure sectors such as transportation, healthcare, and manufacturing that use these chipsets in their wireless equipment may face operational disruptions or data breaches. The lack of required user interaction and authentication lowers the barrier for exploitation, increasing the threat level. Given the widespread use of OpenWrt-based devices in Europe and the presence of MediaTek chipsets in consumer and enterprise-grade equipment, the vulnerability could have broad implications if left unpatched.
Mitigation Recommendations
European organizations should immediately identify devices using the affected MediaTek chipsets (MT6890, MT7915, MT7916, MT7981, MT7986) and verify firmware versions, particularly those running SDK release 7.6.7.2 or earlier and OpenWrt 19.07 or 21.02. Applying the official patches provided by MediaTek (Patch ID WCNCR00418785) is critical to remediate the vulnerability. Network administrators should prioritize firmware updates on wireless access points and routers, especially those deployed in sensitive or high-risk environments. Where patching is not immediately possible, organizations should implement network segmentation to isolate vulnerable devices and restrict wireless access to trusted users only. Monitoring wireless network traffic for unusual activity or signs of exploitation attempts is recommended. Additionally, disabling unnecessary wireless services or features on affected devices can reduce the attack surface. Vendors and integrators should be engaged to ensure updated firmware is deployed promptly. Finally, organizations should review their wireless security policies and incident response plans to prepare for potential exploitation scenarios.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.384Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ee16307eab8b438c025d1f
Added to database: 10/14/2025, 9:21:52 AM
Last enriched: 10/21/2025, 11:42:41 AM
Last updated: 12/2/2025, 3:33:10 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-20792: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791T
HighCVE-2025-20791: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
HighCVE-2025-20790: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
HighCVE-2025-20789: CWE-201 Information Exposure Through Sent Data in MediaTek, Inc. MT6781, MT6833, MT6853, MT6877, MT6893, MT8196
MediumCVE-2025-20788: CWE-1262 Improper Access Control for Register Interface in MediaTek, Inc. MT6991, MT8196
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.