Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20735: CWE-122 Heap Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

0
High
VulnerabilityCVE-2025-20735cvecve-2025-20735cwe-122
Published: Tue Nov 04 2025 (11/04/2025, 06:19:50 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

Description

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00435349; Issue ID: MSV-4051.

AI-Powered Analysis

AILast updated: 11/04/2025, 06:51:26 UTC

Technical Analysis

CVE-2025-20735 is a heap overflow vulnerability classified under CWE-122, found in the WLAN Access Point (AP) driver of multiple MediaTek chipsets including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. The root cause is an incorrect bounds check in the driver code, which leads to an out-of-bounds write on the heap. This memory corruption can be exploited by a local attacker with user-level execution privileges to escalate their privileges to a higher level, potentially root or system-level access. Exploitation does not require user interaction, increasing the risk of automated or stealthy attacks. The affected software versions include SDK release 7.6.7.2 and earlier, as well as openWRT versions 19.07 and 21.02, which are commonly used in embedded wireless devices and routers. Although no public exploits have been reported yet, the vulnerability's nature suggests that once weaponized, it could allow attackers to compromise device integrity, bypass security controls, and potentially pivot within networks. The vulnerability was reserved in November 2024 and published in November 2025, with no CVSS score assigned at the time of reporting. The absence of a patch link indicates that remediation may still be pending or in progress. This vulnerability is significant because MediaTek chipsets are widely deployed in consumer and enterprise wireless equipment, making the attack surface broad. The flaw's exploitation could undermine confidentiality, integrity, and availability of affected devices, especially in environments where local user access is possible. The vulnerability's local scope and requirement for user privileges limit remote exploitation but do not eliminate risk in multi-user or shared environments.

Potential Impact

For European organizations, this vulnerability poses a considerable risk to the security of wireless networking infrastructure that relies on affected MediaTek chipsets. The ability to escalate privileges locally can allow attackers to gain administrative control over routers, access points, or IoT devices, potentially leading to network compromise, interception of sensitive communications, or deployment of persistent malware. Sectors such as telecommunications, critical infrastructure, manufacturing, and enterprise IT environments that deploy embedded wireless devices are particularly vulnerable. The impact extends to operational disruptions, data breaches, and erosion of trust in network security. Given the widespread use of openWRT in European networking devices, organizations using these platforms are at heightened risk. The lack of user interaction for exploitation means that insider threats or compromised user accounts could quickly escalate privileges without alerting users. Additionally, the vulnerability could be leveraged in targeted attacks against high-value assets or supply chain components. The potential for lateral movement within networks following privilege escalation increases the threat to broader organizational security.

Mitigation Recommendations

Organizations should prioritize identifying devices running the affected MediaTek chipsets and firmware versions, including openWRT 19.07 and 21.02 or SDK releases 7.6.7.2 and earlier. Immediate mitigation involves restricting local user access to these devices, enforcing strict access controls, and monitoring for unusual privilege escalation attempts. Network segmentation can reduce the risk of lateral movement if a device is compromised. Administrators should subscribe to MediaTek security advisories and apply patches or firmware updates as soon as they become available. Where patches are delayed, consider deploying host-based intrusion detection systems (HIDS) or endpoint protection solutions capable of detecting anomalous behavior indicative of heap overflow exploitation. Regularly audit device configurations and user permissions to minimize unnecessary local privileges. For openWRT users, upgrading to newer, patched releases or applying vendor-provided patches is critical. Additionally, implement robust logging and alerting mechanisms to detect exploitation attempts early. In environments where physical or local access cannot be fully controlled, consider device replacement or isolation until remediation is possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.394Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1a8d66f5e62e3849331

Added to database: 11/4/2025, 6:48:08 AM

Last enriched: 11/4/2025, 6:51:26 AM

Last updated: 11/5/2025, 1:47:13 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats