Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20715: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

0
High
VulnerabilityCVE-2025-20715cvecve-2025-20715cwe-787
Published: Tue Oct 14 2025 (10/14/2025, 09:11:52 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

Description

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00421152; Issue ID: MSV-3731.

AI-Powered Analysis

AILast updated: 10/14/2025, 09:40:19 UTC

Technical Analysis

CVE-2025-20715 is a security vulnerability classified under CWE-787 (Out-of-bounds Write) affecting multiple MediaTek wireless chipset models, including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. The vulnerability exists in the WLAN Access Point (AP) driver due to an incorrect bounds check, which can lead to an out-of-bounds write operation. This type of memory corruption flaw can allow an attacker to overwrite adjacent memory, potentially leading to privilege escalation or system instability. The vulnerability requires the attacker to have already obtained System-level privileges on the device, meaning it is not exploitable remotely or by unprivileged users. No user interaction is needed to exploit the flaw once System access is achieved. The affected software versions include SDK release 7.6.7.2 and earlier, as well as openWRT 19.07 and 21.02 for the MT6890 chipset. Although no public exploits have been reported, the vulnerability poses a risk of local privilege escalation, which could be leveraged to gain higher control over the device or execute arbitrary code with elevated privileges. The vendor has assigned a patch ID (WCNCR00421152) and issue ID (MSV-3731), but no patch links are currently provided. The lack of a CVSS score indicates that the vulnerability is still under evaluation or that the vendor has not yet published a severity rating. The vulnerability impacts the confidentiality, integrity, and availability of affected devices by enabling attackers to manipulate system memory beyond intended boundaries, potentially leading to system compromise or denial of service.

Potential Impact

For European organizations, the impact of CVE-2025-20715 could be significant, especially for those relying on networking equipment or IoT devices powered by the affected MediaTek chipsets. Privilege escalation vulnerabilities in WLAN AP drivers can allow attackers who have already gained some level of access to fully compromise the device, potentially leading to unauthorized access to network traffic, disruption of network services, or pivoting to other internal systems. This risk is heightened in environments where devices run outdated SDKs or openWRT versions, which are common in embedded systems and custom networking hardware. Critical infrastructure sectors such as telecommunications, manufacturing, and smart city deployments in Europe may be particularly vulnerable if they use affected hardware. Additionally, the vulnerability could be exploited to undermine network security controls, leading to data breaches or service outages. Although exploitation requires prior System privileges, the flaw lowers the barrier for attackers to gain full control, increasing the overall risk posture of affected organizations.

Mitigation Recommendations

European organizations should take proactive steps to mitigate this vulnerability. First, they should inventory all devices and systems using the affected MediaTek chipsets and verify the firmware or SDK versions in use. Immediate action should be taken to update to patched versions once MediaTek releases them, or apply vendor-provided firmware updates for devices running openWRT 19.07 or 21.02. Until patches are available, organizations should restrict local access to affected devices, enforce strict access controls, and monitor for unusual activity indicative of privilege escalation attempts. Network segmentation can limit the impact of a compromised device. Additionally, organizations should implement robust endpoint detection and response (EDR) solutions to detect anomalous behavior at the system level. Regular security audits and penetration testing focusing on local privilege escalation vectors can help identify and remediate weaknesses. Finally, maintaining an up-to-date asset management system will facilitate rapid response to such vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.388Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee16307eab8b438c025d2e

Added to database: 10/14/2025, 9:21:52 AM

Last enriched: 10/14/2025, 9:40:19 AM

Last updated: 10/16/2025, 2:08:41 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats