Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20737: CWE-121 Stack Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

0
High
VulnerabilityCVE-2025-20737cvecve-2025-20737cwe-121
Published: Tue Nov 04 2025 (11/04/2025, 06:19:52 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

Description

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00435343; Issue ID: MSV-4040.

AI-Powered Analysis

AILast updated: 11/11/2025, 07:23:58 UTC

Technical Analysis

CVE-2025-20737 is a stack overflow vulnerability classified under CWE-121 found in the WLAN Access Point (AP) driver of several MediaTek chipsets (MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986). The root cause is an incorrect bounds check in the driver code that leads to an out-of-bounds write operation on the stack. This memory corruption can be exploited by a local attacker with user-level execution privileges to escalate their privileges to a higher level, potentially gaining kernel-level code execution. The vulnerability does not require user interaction, increasing its risk profile. Affected versions include SDK release 7.6.7.2 and earlier, as well as openWRT versions 19.07 and 21.02, which are commonly used in embedded wireless devices and routers. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local, low attack complexity, privileges required at user level, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the vulnerability’s nature makes it a critical concern for devices that rely on these MediaTek chipsets for wireless connectivity. The issue is tracked internally by MediaTek as MSV-4040 and patch ID WCNCR00435343, though no public patch links are currently provided.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of wireless infrastructure devices such as routers, access points, and embedded systems that incorporate the affected MediaTek chipsets. Successful exploitation could allow attackers to escalate privileges locally, potentially leading to full device compromise. This could result in unauthorized access to sensitive network traffic, disruption of wireless services, and the ability to pivot within internal networks. Critical sectors such as telecommunications, finance, government, and industrial control systems that rely on these devices could face confidentiality breaches, service outages, and integrity violations. The lack of required user interaction and the relatively low complexity of exploitation increase the likelihood of attacks, especially in environments where local access or compromised user accounts exist. The vulnerability could also be leveraged in supply chain attacks or by insiders to undermine network security.

Mitigation Recommendations

European organizations should immediately inventory their network devices and embedded systems to identify those using the affected MediaTek chipsets and firmware versions. Until official patches are released, organizations should restrict local access to these devices, enforce strict user privilege management, and monitor for unusual local activity indicative of exploitation attempts. Network segmentation should be employed to limit the impact of a compromised device. Where possible, upgrade to newer firmware versions beyond SDK 7.6.7.2 and openWRT 21.02 once patches are available. Employ host-based intrusion detection systems (HIDS) and endpoint protection to detect anomalous behavior related to privilege escalation. Vendors and integrators should be contacted to obtain timely security updates. Additionally, disabling unnecessary services and interfaces on affected devices can reduce the attack surface. Regular security audits and penetration testing focusing on wireless infrastructure will help identify exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.395Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1a8d66f5e62e3849337

Added to database: 11/4/2025, 6:48:08 AM

Last enriched: 11/11/2025, 7:23:58 AM

Last updated: 12/20/2025, 5:40:00 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats