Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20724: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

0
Medium
VulnerabilityCVE-2025-20724cvecve-2025-20724cwe-125
Published: Tue Oct 14 2025 (10/14/2025, 09:12:06 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

Description

In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418894; Issue ID: MSV-3475.

AI-Powered Analysis

AILast updated: 10/14/2025, 09:38:09 UTC

Technical Analysis

CVE-2025-20724 is a vulnerability classified as CWE-125 (Out-of-bounds Read) affecting multiple MediaTek wireless chipset models, including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. The issue stems from an incorrect bounds check in the WLAN Access Point (AP) driver, which leads to reading memory outside the intended buffer boundaries. This flaw can be exploited by a local attacker who has user-level execution privileges on the device, without requiring any user interaction. The out-of-bounds read can result in local information disclosure, potentially exposing sensitive data residing in memory. The affected software versions include SDK release 7.6.7.2 and earlier, as well as openWRT versions 19.07 and 21.02 for the MT6890 chipset. The vulnerability was publicly disclosed on October 14, 2025, but no public exploits have been reported to date. The lack of a CVSS score necessitates an assessment based on the vulnerability characteristics: it impacts confidentiality due to information disclosure, requires local user privileges but no interaction, and affects a broad range of MediaTek chipsets widely used in wireless networking devices. The vulnerability could be leveraged to gather sensitive information from devices, potentially aiding further attacks or reconnaissance. The issue is tracked internally by MediaTek under issue ID MSV-3475 and patch ID WCNCR00418894, though no direct patch links are provided in the disclosure. The vulnerability's presence in open-source firmware like openWRT increases the attack surface for embedded devices using these chipsets. Overall, this vulnerability represents a significant risk to the confidentiality of data on affected devices and networks.

Potential Impact

For European organizations, the primary impact of CVE-2025-20724 is the potential disclosure of sensitive information from wireless access points and routers that use the affected MediaTek chipsets. This could include configuration data, cryptographic keys, or other memory-resident information that attackers could leverage to compromise network security further. Since the vulnerability requires only local user privileges and no user interaction, insider threats or attackers who gain limited access to network devices could exploit this flaw to escalate their knowledge of the environment. This is particularly concerning for enterprises, government agencies, and critical infrastructure operators that rely on secure wireless communications. The vulnerability could undermine confidentiality, enabling espionage or data leakage. Additionally, compromised devices could serve as footholds for lateral movement within networks. The widespread use of MediaTek chipsets in consumer and enterprise-grade wireless equipment means that many organizations could be affected if they have not updated their firmware or SDKs. The lack of known exploits in the wild currently limits immediate risk, but the vulnerability's characteristics make it a candidate for future exploitation, especially as attackers develop proof-of-concept code. The impact is thus significant for confidentiality, with potential indirect effects on integrity and availability if attackers use disclosed information to mount further attacks.

Mitigation Recommendations

To mitigate CVE-2025-20724, European organizations should prioritize the following actions: 1) Monitor MediaTek and openWRT vendor channels for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2) Restrict local user access to devices running affected chipsets to trusted personnel only, minimizing the risk of exploitation by unauthorized users. 3) Implement network segmentation to isolate wireless access points and routers from sensitive network segments, reducing the impact of any compromise. 4) Employ strict access controls and logging on devices to detect and respond to suspicious local activity indicative of exploitation attempts. 5) For organizations using openWRT-based devices, consider upgrading to versions beyond 21.02 or applying community patches that address this issue. 6) Conduct regular security audits and vulnerability scans on network infrastructure to identify devices running vulnerable firmware. 7) Educate IT staff about the risks associated with local privilege exploitation and encourage adherence to the principle of least privilege. 8) Where feasible, consider replacing legacy devices with newer hardware that does not use the affected MediaTek chipsets or that has confirmed patched firmware. These targeted steps go beyond generic advice by focusing on controlling local access, timely patching, and network architecture adjustments to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.392Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee16317eab8b438c025d53

Added to database: 10/14/2025, 9:21:53 AM

Last enriched: 10/14/2025, 9:38:09 AM

Last updated: 10/16/2025, 8:28:02 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats