Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20727: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2025-20727cvecve-2025-20727cwe-787
Published: Tue Nov 04 2025 (11/04/2025, 06:19:40 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672601; Issue ID: MSV-4623.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:16:05 UTC

Technical Analysis

CVE-2025-20727 is a heap buffer overflow vulnerability classified under CWE-787, found in the modem firmware of a wide range of MediaTek chipsets, including models from MT2735 up to MT8893. The vulnerability arises from an out-of-bounds write condition in the modem's memory management, which can be triggered remotely when a user equipment (UE) connects to a maliciously controlled rogue base station. This flaw enables an attacker to escalate privileges on the modem subsystem without requiring any additional execution privileges, user interaction, or authentication, making it highly exploitable in real-world scenarios. The affected modem firmware versions include LR12A, NR15, NR16, NR17, and NR17R. The vulnerability impacts the confidentiality, integrity, and availability of the modem's operations, potentially allowing attackers to intercept communications, manipulate data, or disrupt service. The CVSS v3.1 base score is 8.1, indicating a high severity with network attack vector, high complexity, no privileges required, no user interaction, and high impact across all security dimensions. While no public exploits have been reported yet, the broad range of affected chipsets and the critical role of modems in mobile communications underscore the urgency of addressing this vulnerability. The issue was reserved in November 2024 and published in November 2025, with MediaTek assigning Patch ID MOLY01672601 and Issue ID MSV-4623 for remediation. The vulnerability is particularly concerning for mobile devices and IoT equipment using these chipsets, as attackers can leverage rogue base stations to compromise devices remotely.

Potential Impact

For European organizations, the impact of CVE-2025-20727 is significant, especially for those in telecommunications, critical infrastructure, and enterprises relying heavily on mobile connectivity. The vulnerability allows remote attackers to escalate privileges on devices without user interaction, potentially leading to unauthorized access to sensitive communications, data leakage, or disruption of mobile services. This could affect mobile network operators, enterprises with mobile device fleets, and IoT deployments using MediaTek chipsets. The exploitation could undermine trust in mobile communications, cause service outages, or facilitate further attacks such as espionage or sabotage. Given the widespread use of MediaTek chipsets in consumer and industrial devices across Europe, the vulnerability poses a broad risk. Additionally, the ability to exploit via rogue base stations means attackers could target specific geographic areas or organizations by deploying malicious infrastructure. This threat could also impact national security and emergency services relying on mobile networks. The high CVSS score reflects the critical nature of the potential damage to confidentiality, integrity, and availability.

Mitigation Recommendations

1. Immediate deployment of vendor-provided patches (Patch ID MOLY01672601) for all affected modem firmware versions is critical to remediate the vulnerability. 2. Mobile device manufacturers and network operators should prioritize firmware updates and coordinate with end-users to ensure timely patching. 3. Implement network-level detection and blocking mechanisms for rogue base stations, including anomaly detection systems and enhanced base station authentication protocols. 4. Employ mobile threat defense solutions that can detect suspicious network behavior indicative of rogue base stations. 5. For enterprise and critical infrastructure, enforce strict mobile device management (MDM) policies to monitor device firmware versions and restrict connections to untrusted networks. 6. Increase user awareness about the risks of connecting to unknown or suspicious cellular networks, although user interaction is not required for exploitation, awareness can aid in detection. 7. Collaborate with telecom regulators and industry groups to enhance base station security standards and rapid incident response capabilities. 8. Conduct regular security audits and penetration testing focusing on mobile network infrastructure and endpoint devices using MediaTek chipsets. 9. Consider network segmentation and isolation of critical systems to limit the impact of compromised mobile devices. 10. Maintain up-to-date threat intelligence feeds to monitor for emerging exploits or attack campaigns leveraging this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.392Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1a6d66f5e62e3848f13

Added to database: 11/4/2025, 6:48:06 AM

Last enriched: 2/5/2026, 8:16:05 AM

Last updated: 2/7/2026, 1:29:47 PM

Views: 270

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats