Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20742: CWE-122 Heap Overflow in MediaTek, Inc. MT6890, MT7603, MT7615, MT7622, MT7915, MT7916, MT7981, MT7986

0
High
VulnerabilityCVE-2025-20742cvecve-2025-20742cwe-122
Published: Tue Nov 04 2025 (11/04/2025, 06:19:56 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7603, MT7615, MT7622, MT7915, MT7916, MT7981, MT7986

Description

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00432680; Issue ID: MSV-3949.

AI-Powered Analysis

AILast updated: 11/11/2025, 07:24:59 UTC

Technical Analysis

CVE-2025-20742 is a heap overflow vulnerability classified under CWE-122 found in the WLAN AP driver of several MediaTek chipsets (MT6890, MT7603, MT7615, MT7622, MT7915, MT7916, MT7981, MT7986). The root cause is an incorrect bounds check in the driver code that allows an attacker to perform an out-of-bounds write on the heap memory. This vulnerability can be exploited remotely by an attacker in wireless proximity to the device, without requiring user interaction or additional execution privileges, making it a potent escalation of privilege vector. Successful exploitation can lead to full compromise of the device’s confidentiality, integrity, and availability, potentially allowing the attacker to execute arbitrary code or disrupt wireless services. The affected software versions include SDK release 7.6.7.2 and earlier, and OpenWrt versions 19.07 and 21.02 for MT6890-based devices. Although no public exploits have been reported yet, the high CVSS score (8.0) reflects the significant risk posed by this vulnerability. The issue was publicly disclosed on November 4, 2025, with MediaTek assigning Patch ID WCNCR00432680 and Issue ID MSV-3949. The vulnerability’s exploitation vector is adjacent network access, meaning attackers must be within wireless range but do not need to authenticate or trick users, increasing the attack surface in environments with many wireless devices.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to wireless infrastructure security, especially in enterprises, public institutions, and critical infrastructure relying on MediaTek-based wireless access points. Exploitation could allow attackers to escalate privileges remotely, leading to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of wireless services. This could result in data breaches, operational downtime, and loss of trust. Given the widespread use of MediaTek chipsets in consumer and enterprise-grade wireless equipment, the attack surface is broad. Organizations in sectors such as finance, healthcare, government, and telecommunications are particularly at risk due to the sensitivity of their data and services. The lack of required user interaction and the proximity-based attack vector make it easier for attackers to exploit in densely populated or public wireless environments common in European urban centers.

Mitigation Recommendations

European organizations should immediately inventory their wireless infrastructure to identify devices using the affected MediaTek chipsets and software versions. They should apply vendor-provided patches or firmware updates as soon as they become available, specifically those addressing Patch ID WCNCR00432680. Where patches are not yet available, organizations should consider network segmentation to isolate vulnerable wireless devices from critical systems and restrict wireless access to trusted users and devices only. Implementing strong wireless encryption (WPA3 where possible) and disabling unnecessary wireless services can reduce exposure. Monitoring wireless network traffic for unusual activity and deploying intrusion detection systems capable of detecting anomalous behavior at the wireless layer can help identify exploitation attempts. Additionally, organizations should enforce strict physical security controls to limit attacker proximity and conduct regular security assessments of wireless infrastructure. Collaboration with vendors and participation in information sharing groups can provide timely updates on exploit developments and mitigation strategies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.395Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1a8d66f5e62e3849346

Added to database: 11/4/2025, 6:48:08 AM

Last enriched: 11/11/2025, 7:24:59 AM

Last updated: 12/13/2025, 2:59:11 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats