CVE-2025-20739: CWE-121 Stack Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00435340; Issue ID: MSV-4038.
AI Analysis
Technical Summary
CVE-2025-20739 is a stack overflow vulnerability classified under CWE-121 found in the WLAN Access Point (AP) driver of several MediaTek chipsets, including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. The vulnerability stems from an incorrect bounds check in the driver code, which allows an out-of-bounds write operation on the stack. This flaw can be exploited by a local attacker who already possesses System-level privileges to escalate their privileges further, potentially gaining higher-level control over the affected device. The vulnerability does not require user interaction to be exploited, but it does require the attacker to have high privileges initially, which limits the attack surface to insiders or attackers who have already compromised the system to some extent. The affected software versions include MediaTek SDK release 7.6.7.2 and earlier, as well as OpenWRT versions 19.07 and 21.02, which are commonly used in embedded wireless devices and routers. The CVSS v3.1 base score is 6.7, indicating a medium severity with high impact on confidentiality, integrity, and availability, but limited by the requirement of local high privileges. No public exploits or active exploitation campaigns have been reported to date. The issue was publicly disclosed on November 4, 2025, and patches have been identified by MediaTek under patch ID WCNCR00435340 and issue ID MSV-4038, though direct patch links are not provided in the source data.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments where MediaTek chipsets are deployed in wireless infrastructure, including enterprise access points, routers, and embedded devices running affected SDK or OpenWRT versions. Successful exploitation could allow an attacker with existing System privileges to escalate their access, potentially leading to full device compromise. This could result in unauthorized access to sensitive network traffic, manipulation of device configurations, or disruption of wireless services, impacting confidentiality, integrity, and availability of critical network resources. Given the widespread use of MediaTek chipsets in consumer and enterprise wireless equipment, organizations in sectors such as telecommunications, manufacturing, and critical infrastructure could face increased risk. The lack of required user interaction facilitates stealthy exploitation once initial access is gained. However, the prerequisite of high privileges limits remote exploitation, making insider threats or post-compromise lateral movement more relevant. Failure to patch could enable attackers to solidify persistence and expand control within networks, complicating incident response and remediation efforts.
Mitigation Recommendations
European organizations should immediately identify all devices using the affected MediaTek chipsets and verify the firmware or SDK versions in use, focusing on those running SDK release 7.6.7.2 or earlier and OpenWRT 19.07 or 21.02. Applying the official patches from MediaTek (patch ID WCNCR00435340) as soon as they become available is critical. Where patching is not immediately feasible, organizations should implement strict access controls to limit local administrative access to trusted personnel only, reducing the risk of privilege escalation. Network segmentation should be enforced to isolate wireless infrastructure devices from general user networks and sensitive systems. Monitoring for unusual local privilege escalation attempts and anomalous behavior on devices with affected chipsets can aid early detection. Additionally, organizations should review and harden device configurations, disable unnecessary services, and ensure firmware integrity checks are in place. For devices running OpenWRT, upgrading to versions beyond 21.02 that include the fix or applying vendor-provided patches is recommended. Regular vulnerability scanning and asset inventory updates will help maintain awareness of exposure. Finally, educating IT staff about the nature of this vulnerability and the importance of limiting high privilege access can reduce insider threat risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20739: CWE-121 Stack Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
Description
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00435340; Issue ID: MSV-4038.
AI-Powered Analysis
Technical Analysis
CVE-2025-20739 is a stack overflow vulnerability classified under CWE-121 found in the WLAN Access Point (AP) driver of several MediaTek chipsets, including MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, and MT7986. The vulnerability stems from an incorrect bounds check in the driver code, which allows an out-of-bounds write operation on the stack. This flaw can be exploited by a local attacker who already possesses System-level privileges to escalate their privileges further, potentially gaining higher-level control over the affected device. The vulnerability does not require user interaction to be exploited, but it does require the attacker to have high privileges initially, which limits the attack surface to insiders or attackers who have already compromised the system to some extent. The affected software versions include MediaTek SDK release 7.6.7.2 and earlier, as well as OpenWRT versions 19.07 and 21.02, which are commonly used in embedded wireless devices and routers. The CVSS v3.1 base score is 6.7, indicating a medium severity with high impact on confidentiality, integrity, and availability, but limited by the requirement of local high privileges. No public exploits or active exploitation campaigns have been reported to date. The issue was publicly disclosed on November 4, 2025, and patches have been identified by MediaTek under patch ID WCNCR00435340 and issue ID MSV-4038, though direct patch links are not provided in the source data.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments where MediaTek chipsets are deployed in wireless infrastructure, including enterprise access points, routers, and embedded devices running affected SDK or OpenWRT versions. Successful exploitation could allow an attacker with existing System privileges to escalate their access, potentially leading to full device compromise. This could result in unauthorized access to sensitive network traffic, manipulation of device configurations, or disruption of wireless services, impacting confidentiality, integrity, and availability of critical network resources. Given the widespread use of MediaTek chipsets in consumer and enterprise wireless equipment, organizations in sectors such as telecommunications, manufacturing, and critical infrastructure could face increased risk. The lack of required user interaction facilitates stealthy exploitation once initial access is gained. However, the prerequisite of high privileges limits remote exploitation, making insider threats or post-compromise lateral movement more relevant. Failure to patch could enable attackers to solidify persistence and expand control within networks, complicating incident response and remediation efforts.
Mitigation Recommendations
European organizations should immediately identify all devices using the affected MediaTek chipsets and verify the firmware or SDK versions in use, focusing on those running SDK release 7.6.7.2 or earlier and OpenWRT 19.07 or 21.02. Applying the official patches from MediaTek (patch ID WCNCR00435340) as soon as they become available is critical. Where patching is not immediately feasible, organizations should implement strict access controls to limit local administrative access to trusted personnel only, reducing the risk of privilege escalation. Network segmentation should be enforced to isolate wireless infrastructure devices from general user networks and sensitive systems. Monitoring for unusual local privilege escalation attempts and anomalous behavior on devices with affected chipsets can aid early detection. Additionally, organizations should review and harden device configurations, disable unnecessary services, and ensure firmware integrity checks are in place. For devices running OpenWRT, upgrading to versions beyond 21.02 that include the fix or applying vendor-provided patches is recommended. Regular vulnerability scanning and asset inventory updates will help maintain awareness of exposure. Finally, educating IT staff about the nature of this vulnerability and the importance of limiting high privilege access can reduce insider threat risks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.395Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6909a1a8d66f5e62e384933d
Added to database: 11/4/2025, 6:48:08 AM
Last enriched: 11/11/2025, 7:24:32 AM
Last updated: 12/20/2025, 5:10:33 PM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.