Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20746: CWE-121 Stack Overflow in MediaTek, Inc. MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893

0
Medium
VulnerabilityCVE-2025-20746cvecve-2025-20746cwe-121
Published: Tue Nov 04 2025 (11/04/2025, 06:20:17 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893

Description

In gnss service, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10010441; Issue ID: MSV-3967.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:39:38 UTC

Technical Analysis

CVE-2025-20746 is a stack overflow vulnerability categorized under CWE-121, discovered in the GNSS (Global Navigation Satellite System) service of numerous MediaTek chipsets, including MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, and MT8893. The root cause is an incorrect bounds check that allows an out-of-bounds write on the stack, which can corrupt memory and lead to privilege escalation. The vulnerability requires the attacker to have already obtained System-level privileges, meaning it is not an initial entry vector but can be used to further elevate privileges locally without user interaction. Affected platforms include Android versions 14 and 15, openWRT 21.02 and 23.05, Yocto 4.0, RDK-B 24Q1, and Zephyr 3.7.0, indicating a broad impact across embedded and IoT operating systems. The CVSS v3.1 score is 6.7 (medium severity), reflecting high impact on confidentiality, integrity, and availability but limited by the requirement for high privileges and local access. No public exploits have been reported yet, but the vulnerability poses a significant risk for devices using these chipsets, especially in telecommunications and consumer electronics. The vendor has assigned Patch ID ALPS10010441 and Issue ID MSV-3967 for remediation. The vulnerability's exploitation could allow attackers to execute arbitrary code with elevated privileges, potentially compromising device security and stability.

Potential Impact

The primary impact of CVE-2025-20746 is local privilege escalation on devices using affected MediaTek chipsets. An attacker with System-level privileges can exploit the stack overflow to gain higher privileges, potentially leading to full control over the device. This can compromise confidentiality by exposing sensitive data, integrity by allowing unauthorized code execution or modification of system components, and availability by causing system crashes or denial of service. Given the affected platforms include widely used embedded and IoT operating systems, the vulnerability could impact a broad range of consumer electronics, telecommunications equipment, and industrial devices. This could lead to compromised user privacy, disruption of critical services, and increased risk of persistent malware infections. Organizations deploying devices with these chipsets may face operational disruptions and reputational damage if exploited. The lack of required user interaction facilitates stealthy exploitation once initial access is obtained. Although no exploits are currently known in the wild, the vulnerability's presence in foundational GNSS services increases the risk profile for location-based services and device integrity.

Mitigation Recommendations

To mitigate CVE-2025-20746, organizations should prioritize applying the vendor-provided patch identified by Patch ID ALPS10010441 as soon as it becomes available. Until patches are deployed, restrict local access to devices running affected MediaTek chipsets to trusted personnel only, minimizing the risk of privilege escalation by malicious insiders or compromised accounts. Implement strict access controls and monitoring on systems with System-level privileges to detect anomalous behavior indicative of exploitation attempts. Employ runtime protections such as stack canaries, address space layout randomization (ASLR), and control flow integrity (CFI) where supported by the platform to reduce exploitation likelihood. Regularly update embedded and IoT device firmware and operating systems to incorporate security fixes. Conduct thorough security audits of GNSS-related services and components to identify any additional weaknesses. For organizations deploying devices in sensitive environments, consider network segmentation and device isolation to limit lateral movement in case of compromise. Finally, maintain incident response readiness to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.396Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1aad66f5e62e384935d

Added to database: 11/4/2025, 6:48:10 AM

Last enriched: 2/27/2026, 12:39:38 AM

Last updated: 3/26/2026, 10:22:50 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses