CVE-2025-20724: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
CVE-2025-20724 is a medium-severity vulnerability in MediaTek WLAN AP drivers affecting multiple chipsets including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. It involves an out-of-bounds read due to improper bounds checking, potentially allowing local attackers with user privileges to disclose sensitive information. Exploitation does not require user interaction but does require local user execution privileges. The vulnerability affects SDK releases up to 7. 6. 7. 2 and certain openWRT versions for MT6890. No known exploits are currently in the wild, and a patch has been identified but not linked. The CVSS score is 5. 5, reflecting a medium risk primarily due to confidentiality impact without integrity or availability compromise.
AI Analysis
Technical Summary
CVE-2025-20724 is an out-of-bounds read vulnerability classified under CWE-125 found in the WLAN Access Point (AP) driver of several MediaTek chipsets including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. The root cause is an incorrect bounds check in the driver code, which allows a local user with execution privileges to read memory outside the intended buffer boundaries. This flaw can lead to local information disclosure, potentially exposing sensitive data from kernel or driver memory spaces. Exploitation does not require user interaction, making it easier for local attackers to leverage once they have access. The vulnerability affects SDK releases up to 7.6.7.2 and openWRT versions 19.07 and 21.02 for the MT6890 chipset. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates that the attack vector is local, with low attack complexity, requiring low privileges but no user interaction, and results in high confidentiality impact without affecting integrity or availability. Although no exploits are currently known in the wild, the presence of a patch (WCNCR00418894) suggests vendor awareness and remediation efforts. This vulnerability is particularly relevant for embedded systems and wireless infrastructure devices using these MediaTek chipsets, which are common in consumer and enterprise wireless access points and IoT devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-20724 is the potential local disclosure of sensitive information on devices using affected MediaTek chipsets. This could include wireless access points, routers, or embedded IoT devices prevalent in enterprise and industrial environments. Confidentiality breaches could expose cryptographic keys, configuration data, or user credentials, increasing the risk of further compromise. Since exploitation requires local user privileges, the threat is heightened in environments where untrusted users have physical or shell access to devices, such as shared offices, managed service providers, or multi-tenant data centers. The lack of integrity or availability impact limits the risk of service disruption or data manipulation. However, information disclosure can facilitate lateral movement or privilege escalation in complex networks. Given the widespread use of MediaTek chipsets in networking hardware, European organizations relying on these devices should consider this vulnerability a moderate risk, especially in sectors with sensitive data or critical infrastructure.
Mitigation Recommendations
1. Apply the vendor-provided patch WCNCR00418894 as soon as it becomes available to affected devices and SDKs. 2. For devices running openWRT 19.07 or 21.02 on MT6890 chipsets, upgrade to versions incorporating the fix or apply vendor patches. 3. Restrict local user access to devices running affected MediaTek chipsets, enforcing strict access controls and monitoring for unauthorized logins. 4. Implement network segmentation to limit exposure of vulnerable devices to untrusted users or networks. 5. Employ host-based intrusion detection systems (HIDS) to detect anomalous local activities that could indicate exploitation attempts. 6. Regularly audit and update firmware and drivers on embedded devices and wireless infrastructure to maintain security posture. 7. Educate administrators and users about the risks of local privilege exploitation and enforce least privilege principles. 8. Monitor vendor advisories and security bulletins for updates or emerging exploit information related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20724: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
Description
CVE-2025-20724 is a medium-severity vulnerability in MediaTek WLAN AP drivers affecting multiple chipsets including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. It involves an out-of-bounds read due to improper bounds checking, potentially allowing local attackers with user privileges to disclose sensitive information. Exploitation does not require user interaction but does require local user execution privileges. The vulnerability affects SDK releases up to 7. 6. 7. 2 and certain openWRT versions for MT6890. No known exploits are currently in the wild, and a patch has been identified but not linked. The CVSS score is 5. 5, reflecting a medium risk primarily due to confidentiality impact without integrity or availability compromise.
AI-Powered Analysis
Technical Analysis
CVE-2025-20724 is an out-of-bounds read vulnerability classified under CWE-125 found in the WLAN Access Point (AP) driver of several MediaTek chipsets including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. The root cause is an incorrect bounds check in the driver code, which allows a local user with execution privileges to read memory outside the intended buffer boundaries. This flaw can lead to local information disclosure, potentially exposing sensitive data from kernel or driver memory spaces. Exploitation does not require user interaction, making it easier for local attackers to leverage once they have access. The vulnerability affects SDK releases up to 7.6.7.2 and openWRT versions 19.07 and 21.02 for the MT6890 chipset. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates that the attack vector is local, with low attack complexity, requiring low privileges but no user interaction, and results in high confidentiality impact without affecting integrity or availability. Although no exploits are currently known in the wild, the presence of a patch (WCNCR00418894) suggests vendor awareness and remediation efforts. This vulnerability is particularly relevant for embedded systems and wireless infrastructure devices using these MediaTek chipsets, which are common in consumer and enterprise wireless access points and IoT devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-20724 is the potential local disclosure of sensitive information on devices using affected MediaTek chipsets. This could include wireless access points, routers, or embedded IoT devices prevalent in enterprise and industrial environments. Confidentiality breaches could expose cryptographic keys, configuration data, or user credentials, increasing the risk of further compromise. Since exploitation requires local user privileges, the threat is heightened in environments where untrusted users have physical or shell access to devices, such as shared offices, managed service providers, or multi-tenant data centers. The lack of integrity or availability impact limits the risk of service disruption or data manipulation. However, information disclosure can facilitate lateral movement or privilege escalation in complex networks. Given the widespread use of MediaTek chipsets in networking hardware, European organizations relying on these devices should consider this vulnerability a moderate risk, especially in sectors with sensitive data or critical infrastructure.
Mitigation Recommendations
1. Apply the vendor-provided patch WCNCR00418894 as soon as it becomes available to affected devices and SDKs. 2. For devices running openWRT 19.07 or 21.02 on MT6890 chipsets, upgrade to versions incorporating the fix or apply vendor patches. 3. Restrict local user access to devices running affected MediaTek chipsets, enforcing strict access controls and monitoring for unauthorized logins. 4. Implement network segmentation to limit exposure of vulnerable devices to untrusted users or networks. 5. Employ host-based intrusion detection systems (HIDS) to detect anomalous local activities that could indicate exploitation attempts. 6. Regularly audit and update firmware and drivers on embedded devices and wireless infrastructure to maintain security posture. 7. Educate administrators and users about the risks of local privilege exploitation and enforce least privilege principles. 8. Monitor vendor advisories and security bulletins for updates or emerging exploit information related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.392Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ee16317eab8b438c025d53
Added to database: 10/14/2025, 9:21:53 AM
Last enriched: 10/21/2025, 12:04:42 PM
Last updated: 12/2/2025, 3:50:16 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-20792: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791T
HighCVE-2025-20791: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
HighCVE-2025-20790: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
HighCVE-2025-20789: CWE-201 Information Exposure Through Sent Data in MediaTek, Inc. MT6781, MT6833, MT6853, MT6877, MT6893, MT8196
MediumCVE-2025-20788: CWE-1262 Improper Access Control for Register Interface in MediaTek, Inc. MT6991, MT8196
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.