Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20724: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

0
Medium
VulnerabilityCVE-2025-20724cvecve-2025-20724cwe-125
Published: Tue Oct 14 2025 (10/14/2025, 09:12:06 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

Description

CVE-2025-20724 is a medium-severity vulnerability in MediaTek WLAN AP drivers affecting multiple chipsets including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. It involves an out-of-bounds read due to improper bounds checking, potentially allowing local attackers with user privileges to disclose sensitive information. Exploitation does not require user interaction but does require local user execution privileges. The vulnerability affects SDK releases up to 7. 6. 7. 2 and certain openWRT versions for MT6890. No known exploits are currently in the wild, and a patch has been identified but not linked. The CVSS score is 5. 5, reflecting a medium risk primarily due to confidentiality impact without integrity or availability compromise.

AI-Powered Analysis

AILast updated: 10/21/2025, 12:04:42 UTC

Technical Analysis

CVE-2025-20724 is an out-of-bounds read vulnerability classified under CWE-125 found in the WLAN Access Point (AP) driver of several MediaTek chipsets including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. The root cause is an incorrect bounds check in the driver code, which allows a local user with execution privileges to read memory outside the intended buffer boundaries. This flaw can lead to local information disclosure, potentially exposing sensitive data from kernel or driver memory spaces. Exploitation does not require user interaction, making it easier for local attackers to leverage once they have access. The vulnerability affects SDK releases up to 7.6.7.2 and openWRT versions 19.07 and 21.02 for the MT6890 chipset. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates that the attack vector is local, with low attack complexity, requiring low privileges but no user interaction, and results in high confidentiality impact without affecting integrity or availability. Although no exploits are currently known in the wild, the presence of a patch (WCNCR00418894) suggests vendor awareness and remediation efforts. This vulnerability is particularly relevant for embedded systems and wireless infrastructure devices using these MediaTek chipsets, which are common in consumer and enterprise wireless access points and IoT devices.

Potential Impact

For European organizations, the primary impact of CVE-2025-20724 is the potential local disclosure of sensitive information on devices using affected MediaTek chipsets. This could include wireless access points, routers, or embedded IoT devices prevalent in enterprise and industrial environments. Confidentiality breaches could expose cryptographic keys, configuration data, or user credentials, increasing the risk of further compromise. Since exploitation requires local user privileges, the threat is heightened in environments where untrusted users have physical or shell access to devices, such as shared offices, managed service providers, or multi-tenant data centers. The lack of integrity or availability impact limits the risk of service disruption or data manipulation. However, information disclosure can facilitate lateral movement or privilege escalation in complex networks. Given the widespread use of MediaTek chipsets in networking hardware, European organizations relying on these devices should consider this vulnerability a moderate risk, especially in sectors with sensitive data or critical infrastructure.

Mitigation Recommendations

1. Apply the vendor-provided patch WCNCR00418894 as soon as it becomes available to affected devices and SDKs. 2. For devices running openWRT 19.07 or 21.02 on MT6890 chipsets, upgrade to versions incorporating the fix or apply vendor patches. 3. Restrict local user access to devices running affected MediaTek chipsets, enforcing strict access controls and monitoring for unauthorized logins. 4. Implement network segmentation to limit exposure of vulnerable devices to untrusted users or networks. 5. Employ host-based intrusion detection systems (HIDS) to detect anomalous local activities that could indicate exploitation attempts. 6. Regularly audit and update firmware and drivers on embedded devices and wireless infrastructure to maintain security posture. 7. Educate administrators and users about the risks of local privilege exploitation and enforce least privilege principles. 8. Monitor vendor advisories and security bulletins for updates or emerging exploit information related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.392Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee16317eab8b438c025d53

Added to database: 10/14/2025, 9:21:53 AM

Last enriched: 10/21/2025, 12:04:42 PM

Last updated: 12/2/2025, 3:50:16 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats