Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20711: CWE-1287 Specified Type in MediaTek, Inc. MT6890, MT7916, MT7981, MT7986

0
High
VulnerabilityCVE-2025-20711cvecve-2025-20711cwe-1287
Published: Tue Oct 14 2025 (10/14/2025, 09:11:32 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7916, MT7981, MT7986

Description

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00422399; Issue ID: MSV-3748.

AI-Powered Analysis

AILast updated: 10/14/2025, 09:41:51 UTC

Technical Analysis

CVE-2025-20711 is a security vulnerability identified in the wlan AP driver software of MediaTek chipsets MT6890, MT7916, MT7981, and MT7986. The root cause is an out-of-bounds write triggered by an incorrect bounds check in the driver code, classified under CWE-1287 (Improper Restriction of Operations within the Bounds of a Memory Buffer). This flaw allows a remote attacker located within wireless range (proximal or adjacent) to escalate privileges on the device without requiring any additional execution privileges or user interaction, making exploitation feasible without user involvement. The affected software versions include SDK release 7.6.7.2 and earlier, and OpenWrt versions 19.07 and 21.02 for MT6890-based devices. The vulnerability could lead to corruption of memory structures, potentially enabling attackers to execute arbitrary code or gain elevated privileges on the device, compromising the confidentiality, integrity, and availability of the wireless access point. Although no public exploits are currently known, the vulnerability's nature and ease of exploitation (no user interaction needed) make it a significant risk. The issue was reserved in November 2024 and published in October 2025, with MediaTek assigning the issue ID MSV-3748 and patch ID WCNCR00422399. The lack of a CVSS score requires an independent severity assessment based on the impact and exploitability factors.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to wireless network infrastructure security. Exploitation could allow attackers physically near the target (e.g., within Wi-Fi range) to escalate privileges on access points or routers using affected MediaTek chipsets, potentially leading to unauthorized network access, interception of sensitive data, or disruption of network services. This could impact enterprises, public institutions, and critical infrastructure relying on wireless connectivity. The integrity and availability of wireless networks could be compromised, affecting business continuity and data protection compliance under regulations such as GDPR. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within corporate networks. The absence of user interaction requirements lowers the barrier for exploitation, increasing the threat level. Organizations with widespread deployment of affected devices, especially those using OpenWrt-based firmware or SDK versions prior to 7.6.7.2, are at higher risk. The threat is amplified in environments with dense wireless device usage or where physical security controls are limited.

Mitigation Recommendations

1. Apply official patches from MediaTek as soon as they become available, specifically addressing the WCNCR00422399 patch for the affected chipsets and firmware versions. 2. For devices running OpenWrt 19.07 or 21.02 on MT6890 chipsets, upgrade to patched firmware releases or consider alternative secure firmware if patches are delayed. 3. Implement strict physical security controls to limit attacker proximity to wireless access points, such as securing device locations and reducing wireless signal leakage outside controlled areas. 4. Monitor wireless network devices for unusual privilege escalations or anomalous behavior indicative of exploitation attempts. 5. Employ network segmentation to isolate critical wireless infrastructure from sensitive internal networks, limiting potential lateral movement. 6. Conduct regular security audits and vulnerability assessments focusing on wireless infrastructure components. 7. Educate IT staff on the specific risks associated with MediaTek chipset vulnerabilities and ensure timely response to security advisories. 8. Consider deploying intrusion detection systems capable of detecting abnormal wireless activity or exploitation attempts targeting access points.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.384Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee16307eab8b438c025d22

Added to database: 10/14/2025, 9:21:52 AM

Last enriched: 10/14/2025, 9:41:51 AM

Last updated: 10/16/2025, 6:00:49 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats