CVE-2025-20737: CWE-121 Stack Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00435343; Issue ID: MSV-4040.
AI Analysis
Technical Summary
CVE-2025-20737 is a stack overflow vulnerability classified under CWE-121 found in the WLAN Access Point (AP) driver of several MediaTek chipsets (MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986). The root cause is an incorrect bounds check in the driver code that leads to an out-of-bounds write operation on the stack. This memory corruption can be exploited by a local attacker with user-level execution privileges to escalate their privileges to a higher level, potentially gaining kernel-level code execution. The vulnerability does not require user interaction, increasing its risk profile. Affected versions include SDK release 7.6.7.2 and earlier, as well as openWRT versions 19.07 and 21.02, which are commonly used in embedded wireless devices and routers. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local, low attack complexity, privileges required at user level, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the vulnerability’s nature makes it a critical concern for devices that rely on these MediaTek chipsets for wireless connectivity. The issue is tracked internally by MediaTek as MSV-4040 and patch ID WCNCR00435343, though no public patch links are currently provided.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of wireless infrastructure devices such as routers, access points, and embedded systems that incorporate the affected MediaTek chipsets. Successful exploitation could allow attackers to escalate privileges locally, potentially leading to full device compromise. This could result in unauthorized access to sensitive network traffic, disruption of wireless services, and the ability to pivot within internal networks. Critical sectors such as telecommunications, finance, government, and industrial control systems that rely on these devices could face confidentiality breaches, service outages, and integrity violations. The lack of required user interaction and the relatively low complexity of exploitation increase the likelihood of attacks, especially in environments where local access or compromised user accounts exist. The vulnerability could also be leveraged in supply chain attacks or by insiders to undermine network security.
Mitigation Recommendations
European organizations should immediately inventory their network devices and embedded systems to identify those using the affected MediaTek chipsets and firmware versions. Until official patches are released, organizations should restrict local access to these devices, enforce strict user privilege management, and monitor for unusual local activity indicative of exploitation attempts. Network segmentation should be employed to limit the impact of a compromised device. Where possible, upgrade to newer firmware versions beyond SDK 7.6.7.2 and openWRT 21.02 once patches are available. Employ host-based intrusion detection systems (HIDS) and endpoint protection to detect anomalous behavior related to privilege escalation. Vendors and integrators should be contacted to obtain timely security updates. Additionally, disabling unnecessary services and interfaces on affected devices can reduce the attack surface. Regular security audits and penetration testing focusing on wireless infrastructure will help identify exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20737: CWE-121 Stack Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
Description
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00435343; Issue ID: MSV-4040.
AI-Powered Analysis
Technical Analysis
CVE-2025-20737 is a stack overflow vulnerability classified under CWE-121 found in the WLAN Access Point (AP) driver of several MediaTek chipsets (MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986). The root cause is an incorrect bounds check in the driver code that leads to an out-of-bounds write operation on the stack. This memory corruption can be exploited by a local attacker with user-level execution privileges to escalate their privileges to a higher level, potentially gaining kernel-level code execution. The vulnerability does not require user interaction, increasing its risk profile. Affected versions include SDK release 7.6.7.2 and earlier, as well as openWRT versions 19.07 and 21.02, which are commonly used in embedded wireless devices and routers. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local, low attack complexity, privileges required at user level, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the vulnerability’s nature makes it a critical concern for devices that rely on these MediaTek chipsets for wireless connectivity. The issue is tracked internally by MediaTek as MSV-4040 and patch ID WCNCR00435343, though no public patch links are currently provided.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of wireless infrastructure devices such as routers, access points, and embedded systems that incorporate the affected MediaTek chipsets. Successful exploitation could allow attackers to escalate privileges locally, potentially leading to full device compromise. This could result in unauthorized access to sensitive network traffic, disruption of wireless services, and the ability to pivot within internal networks. Critical sectors such as telecommunications, finance, government, and industrial control systems that rely on these devices could face confidentiality breaches, service outages, and integrity violations. The lack of required user interaction and the relatively low complexity of exploitation increase the likelihood of attacks, especially in environments where local access or compromised user accounts exist. The vulnerability could also be leveraged in supply chain attacks or by insiders to undermine network security.
Mitigation Recommendations
European organizations should immediately inventory their network devices and embedded systems to identify those using the affected MediaTek chipsets and firmware versions. Until official patches are released, organizations should restrict local access to these devices, enforce strict user privilege management, and monitor for unusual local activity indicative of exploitation attempts. Network segmentation should be employed to limit the impact of a compromised device. Where possible, upgrade to newer firmware versions beyond SDK 7.6.7.2 and openWRT 21.02 once patches are available. Employ host-based intrusion detection systems (HIDS) and endpoint protection to detect anomalous behavior related to privilege escalation. Vendors and integrators should be contacted to obtain timely security updates. Additionally, disabling unnecessary services and interfaces on affected devices can reduce the attack surface. Regular security audits and penetration testing focusing on wireless infrastructure will help identify exploitation attempts early.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.395Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6909a1a8d66f5e62e3849337
Added to database: 11/4/2025, 6:48:08 AM
Last enriched: 11/11/2025, 7:23:58 AM
Last updated: 12/20/2025, 5:40:00 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.