Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20725: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893

0
High
VulnerabilityCVE-2025-20725cvecve-2025-20725cwe-787
Published: Tue Nov 04 2025 (11/04/2025, 06:19:43 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893

Description

In ims service, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01671924; Issue ID: MSV-4620.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:34:13 UTC

Technical Analysis

CVE-2025-20725 is a critical vulnerability classified under CWE-787 (Out-of-bounds Write) affecting the IMS (IP Multimedia Subsystem) service in a broad range of MediaTek modem chipsets, including but not limited to MT2735, MT6761, MT6762, MT6769, MT6771, MT6853, MT6980, MT8788, and many others. The flaw results from a missing bounds check in the IMS service code, which allows an attacker to perform an out-of-bounds write operation. This memory corruption can lead to remote escalation of privilege on the device. The attack vector involves a user equipment (UE) connecting to a rogue base station controlled by the attacker. Notably, exploitation does not require any user interaction or elevated privileges on the device, making it easier to exploit remotely. The vulnerability affects modem firmware versions LR12A, NR15, and NR16. The CVSS v3.1 base score is 7.5, indicating high severity, with attack vector network (AV:N), attack complexity high (AC:H), privileges required low (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high. MediaTek has assigned patch ID MOLY01671924 to fix this issue. Although no known exploits are currently reported in the wild, the vulnerability's characteristics pose a significant risk to mobile devices using these chipsets, potentially allowing attackers to gain unauthorized control or disrupt device functionality remotely.

Potential Impact

The vulnerability allows remote attackers to escalate privileges on affected devices by exploiting a rogue base station, potentially compromising the confidentiality, integrity, and availability of the device. This could lead to unauthorized access to sensitive user data, interception or manipulation of communications, installation of persistent malware, or denial of service conditions. Given the widespread use of MediaTek chipsets in smartphones and IoT devices globally, the impact can be extensive, affecting both individual users and enterprise environments relying on mobile connectivity. The lack of required user interaction and low privilege requirements lower the barrier for exploitation, increasing the threat level. Organizations could face data breaches, service disruptions, and increased risk of targeted attacks leveraging this vulnerability. The broad range of affected chipset models means many device manufacturers and carriers must coordinate patch deployment, complicating mitigation efforts.

Mitigation Recommendations

1. Immediately apply the official patch MOLY01671924 provided by MediaTek to all affected modem firmware versions (LR12A, NR15, NR16). 2. Device manufacturers and carriers should prioritize firmware updates and coordinate rapid deployment to end users. 3. Implement network-level protections to detect and block rogue base stations, such as enhanced base station authentication and anomaly detection systems. 4. Employ mobile threat defense solutions capable of identifying suspicious network behavior indicative of rogue base station attacks. 5. Educate users and administrators about the risks of connecting to untrusted cellular networks, especially in high-risk environments. 6. Monitor device logs and network traffic for signs of exploitation attempts or unusual IMS service behavior. 7. For critical infrastructure relying on affected devices, consider temporary network segmentation or alternative communication channels until patches are applied. 8. Collaborate with telecom providers to enhance detection and mitigation of rogue base stations in their networks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.392Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1a6d66f5e62e3848f0d

Added to database: 11/4/2025, 6:48:06 AM

Last enriched: 2/27/2026, 12:34:13 AM

Last updated: 3/25/2026, 1:50:51 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses