CVE-2025-20739: CWE-121 Stack Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00435340; Issue ID: MSV-4038.
AI Analysis
Technical Summary
CVE-2025-20739 is a stack overflow vulnerability classified under CWE-121 found in the WLAN Access Point (AP) driver of several MediaTek chipsets, including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. The vulnerability stems from an incorrect bounds check in the driver code, which allows an out-of-bounds write operation on the stack. This flaw can be exploited by a local attacker who already possesses System-level privileges to escalate their privileges further, potentially gaining higher-level control over the affected device. The vulnerability does not require user interaction to be exploited, but it does require the attacker to have high privileges initially, which limits the attack surface to insiders or attackers who have already compromised the system to some extent. The affected software versions include MediaTek SDK release 7.6.7.2 and earlier, as well as OpenWRT versions 19.07 and 21.02, which are commonly used in embedded wireless devices and routers. The CVSS v3.1 base score is 6.7, indicating a medium severity with high impact on confidentiality, integrity, and availability, but limited by the requirement of local high privileges. No public exploits or active exploitation campaigns have been reported to date. The issue was publicly disclosed on November 4, 2025, and patches have been identified by MediaTek under patch ID WCNCR00435340 and issue ID MSV-4038, though direct patch links are not provided in the source data.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments where MediaTek chipsets are deployed in wireless infrastructure, including enterprise access points, routers, and embedded devices running affected SDK or OpenWRT versions. Successful exploitation could allow an attacker with existing System privileges to escalate their access, potentially leading to full device compromise. This could result in unauthorized access to sensitive network traffic, manipulation of device configurations, or disruption of wireless services, impacting confidentiality, integrity, and availability of critical network resources. Given the widespread use of MediaTek chipsets in consumer and enterprise wireless equipment, organizations in sectors such as telecommunications, manufacturing, and critical infrastructure could face increased risk. The lack of required user interaction facilitates stealthy exploitation once initial access is gained. However, the prerequisite of high privileges limits remote exploitation, making insider threats or post-compromise lateral movement more relevant. Failure to patch could enable attackers to solidify persistence and expand control within networks, complicating incident response and remediation efforts.
Mitigation Recommendations
European organizations should immediately identify all devices using the affected MediaTek chipsets and verify the firmware or SDK versions in use, focusing on those running SDK release 7.6.7.2 or earlier and OpenWRT 19.07 or 21.02. Applying the official patches from MediaTek (patch ID WCNCR00435340) as soon as they become available is critical. Where patching is not immediately feasible, organizations should implement strict access controls to limit local administrative access to trusted personnel only, reducing the risk of privilege escalation. Network segmentation should be enforced to isolate wireless infrastructure devices from general user networks and sensitive systems. Monitoring for unusual local privilege escalation attempts and anomalous behavior on devices with affected chipsets can aid early detection. Additionally, organizations should review and harden device configurations, disable unnecessary services, and ensure firmware integrity checks are in place. For devices running OpenWRT, upgrading to versions beyond 21.02 that include the fix or applying vendor-provided patches is recommended. Regular vulnerability scanning and asset inventory updates will help maintain awareness of exposure. Finally, educating IT staff about the nature of this vulnerability and the importance of limiting high privilege access can reduce insider threat risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20739: CWE-121 Stack Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
Description
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00435340; Issue ID: MSV-4038.
AI-Powered Analysis
Technical Analysis
CVE-2025-20739 is a stack overflow vulnerability classified under CWE-121 found in the WLAN Access Point (AP) driver of several MediaTek chipsets, including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. The vulnerability stems from an incorrect bounds check in the driver code, which allows an out-of-bounds write operation on the stack. This flaw can be exploited by a local attacker who already possesses System-level privileges to escalate their privileges further, potentially gaining higher-level control over the affected device. The vulnerability does not require user interaction to be exploited, but it does require the attacker to have high privileges initially, which limits the attack surface to insiders or attackers who have already compromised the system to some extent. The affected software versions include MediaTek SDK release 7.6.7.2 and earlier, as well as OpenWRT versions 19.07 and 21.02, which are commonly used in embedded wireless devices and routers. The CVSS v3.1 base score is 6.7, indicating a medium severity with high impact on confidentiality, integrity, and availability, but limited by the requirement of local high privileges. No public exploits or active exploitation campaigns have been reported to date. The issue was publicly disclosed on November 4, 2025, and patches have been identified by MediaTek under patch ID WCNCR00435340 and issue ID MSV-4038, though direct patch links are not provided in the source data.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments where MediaTek chipsets are deployed in wireless infrastructure, including enterprise access points, routers, and embedded devices running affected SDK or OpenWRT versions. Successful exploitation could allow an attacker with existing System privileges to escalate their access, potentially leading to full device compromise. This could result in unauthorized access to sensitive network traffic, manipulation of device configurations, or disruption of wireless services, impacting confidentiality, integrity, and availability of critical network resources. Given the widespread use of MediaTek chipsets in consumer and enterprise wireless equipment, organizations in sectors such as telecommunications, manufacturing, and critical infrastructure could face increased risk. The lack of required user interaction facilitates stealthy exploitation once initial access is gained. However, the prerequisite of high privileges limits remote exploitation, making insider threats or post-compromise lateral movement more relevant. Failure to patch could enable attackers to solidify persistence and expand control within networks, complicating incident response and remediation efforts.
Mitigation Recommendations
European organizations should immediately identify all devices using the affected MediaTek chipsets and verify the firmware or SDK versions in use, focusing on those running SDK release 7.6.7.2 or earlier and OpenWRT 19.07 or 21.02. Applying the official patches from MediaTek (patch ID WCNCR00435340) as soon as they become available is critical. Where patching is not immediately feasible, organizations should implement strict access controls to limit local administrative access to trusted personnel only, reducing the risk of privilege escalation. Network segmentation should be enforced to isolate wireless infrastructure devices from general user networks and sensitive systems. Monitoring for unusual local privilege escalation attempts and anomalous behavior on devices with affected chipsets can aid early detection. Additionally, organizations should review and harden device configurations, disable unnecessary services, and ensure firmware integrity checks are in place. For devices running OpenWRT, upgrading to versions beyond 21.02 that include the fix or applying vendor-provided patches is recommended. Regular vulnerability scanning and asset inventory updates will help maintain awareness of exposure. Finally, educating IT staff about the nature of this vulnerability and the importance of limiting high privilege access can reduce insider threat risks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.395Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6909a1a8d66f5e62e384933d
Added to database: 11/4/2025, 6:48:08 AM
Last enriched: 11/11/2025, 7:24:32 AM
Last updated: 2/2/2026, 12:42:08 PM
Views: 99
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Over 1,400 MongoDB Databases Ransacked by Threat Actor
MediumMicrosoft Moves Closer to Disabling NTLM
MediumCVE-2026-0599: CWE-400 Uncontrolled Resource Consumption in huggingface huggingface/text-generation-inference
HighCVE-2025-7105: CWE-400 Uncontrolled Resource Consumption in danny-avila danny-avila/librechat
MediumCVE-2025-6208: CWE-400 Uncontrolled Resource Consumption in run-llama run-llama/llama_index
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.