Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20710: CWE-190 Integer Overflow in MediaTek, Inc. MT6890, MT7915, MT7916, MT7981, MT7986

0
High
VulnerabilityCVE-2025-20710cvecve-2025-20710cwe-190
Published: Tue Oct 14 2025 (10/14/2025, 09:11:34 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7915, MT7916, MT7981, MT7986

Description

In wlan AP driver, there is a possible out of bounds write due to an integer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418785; Issue ID: MSV-3515.

AI-Powered Analysis

AILast updated: 10/14/2025, 09:41:37 UTC

Technical Analysis

CVE-2025-20710 is a security vulnerability classified under CWE-190 (Integer Overflow) affecting multiple MediaTek wireless chipset models including MT6890, MT7915, MT7916, MT7981, and MT7986. The flaw exists in the WLAN Access Point (AP) driver, where an integer overflow leads to an out-of-bounds write condition. This memory corruption can be triggered remotely by an attacker in close proximity to the vulnerable device, enabling escalation of privileges without requiring any prior execution privileges or user interaction. The affected software versions include SDK release 7.6.7.2 and earlier, as well as OpenWrt versions 19.07 and 21.02 for MT6890-based devices. The vulnerability could allow an attacker to compromise the integrity of the device’s firmware or operating system, potentially leading to unauthorized control over the device or disruption of wireless services. No public exploits have been reported yet, but the nature of the vulnerability suggests it could be weaponized in targeted attacks against wireless infrastructure. The issue was reserved in November 2024 and published in October 2025, with MediaTek acknowledging the problem but no patch links currently available. This vulnerability is particularly concerning for embedded and IoT devices that rely on these chipsets for wireless connectivity, as it could serve as a foothold for lateral movement within networks.

Potential Impact

For European organizations, the impact of CVE-2025-20710 could be significant, especially for those relying on MediaTek-based wireless access points or embedded devices in their network infrastructure. Successful exploitation could lead to unauthorized privilege escalation, allowing attackers to manipulate device configurations, intercept or disrupt wireless communications, or use compromised devices as pivot points for further network intrusion. This could affect confidentiality, integrity, and availability of network services. Critical infrastructure, enterprises, and service providers using these chipsets may face operational disruptions or data breaches. Since the vulnerability does not require user interaction and can be exploited remotely within wireless range, it increases the risk profile for organizations with dense wireless deployments. The absence of known exploits currently provides a window for proactive mitigation, but the potential for rapid weaponization remains high.

Mitigation Recommendations

Organizations should monitor MediaTek’s official channels for patches addressing CVE-2025-20710 and apply them promptly once available. In the interim, network administrators should restrict physical and wireless access to vulnerable devices by implementing strong wireless security controls such as WPA3, disabling unnecessary wireless services, and segmenting wireless networks to limit exposure. Employing wireless intrusion detection/prevention systems (WIDS/WIPS) can help detect anomalous activity indicative of exploitation attempts. Regularly updating OpenWrt or other firmware to the latest supported versions can reduce risk. For critical deployments, consider replacing or isolating devices using affected chipsets until patches are confirmed. Additionally, organizations should conduct thorough audits of wireless infrastructure to identify all devices running vulnerable firmware versions and maintain strict access controls to prevent unauthorized proximity-based attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.384Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee16307eab8b438c025d1f

Added to database: 10/14/2025, 9:21:52 AM

Last enriched: 10/14/2025, 9:41:37 AM

Last updated: 10/16/2025, 6:00:43 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats