Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20748: CWE-120 Classic Buffer Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

0
Medium
VulnerabilityCVE-2025-20748cvecve-2025-20748cwe-120
Published: Tue Nov 04 2025 (11/04/2025, 06:20:23 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986

Description

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00432679; Issue ID: MSV-3950.

AI-Powered Analysis

AILast updated: 11/11/2025, 07:26:36 UTC

Technical Analysis

CVE-2025-20748 is a classic buffer overflow vulnerability categorized under CWE-120, found in the WLAN Access Point (AP) driver of several MediaTek chipsets (MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986). The root cause is an incorrect bounds check in the driver code, which allows an out-of-bounds write operation. This flaw can be exploited by a malicious actor who already possesses System-level privileges on the affected device to escalate their privileges further, potentially gaining higher control over the system. The vulnerability does not require user interaction, making it easier to exploit once local access is obtained. Affected software versions include SDK release 7.6.7.2 and earlier, as well as openWRT versions 19.07 and 21.02, which are commonly used in embedded wireless devices. The CVSS v3.1 base score is 6.7, reflecting a medium severity with high impact on confidentiality, integrity, and availability, but limited by the requirement of high privileges for exploitation. No public exploits have been reported yet, but the vulnerability poses a significant risk in environments where attackers can gain local system access. The issue is tracked internally by MediaTek under patch ID WCNCR00432679 and issue ID MSV-3950. The vulnerability could allow attackers to manipulate WLAN driver behavior, potentially leading to system instability, data corruption, or further privilege escalation.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where MediaTek chipsets are deployed in wireless networking equipment, such as enterprise access points, routers, or embedded IoT devices running affected SDK or openWRT versions. Successful exploitation could lead to local privilege escalation, enabling attackers to gain full control over affected devices, compromise sensitive data, disrupt network availability, or pivot to other internal systems. This is particularly concerning for critical infrastructure sectors, telecommunications, and enterprises relying on MediaTek-based wireless solutions. The medium severity rating reflects that while remote exploitation is not possible, the prerequisite of System-level access means the threat is more relevant in scenarios involving insider threats, compromised credentials, or chained attacks. The confidentiality, integrity, and availability of network infrastructure could be impacted, potentially leading to data breaches, service outages, or unauthorized network modifications.

Mitigation Recommendations

1. Apply official patches from MediaTek as soon as they become available, specifically addressing patch ID WCNCR00432679. 2. Upgrade affected devices to SDK versions later than 7.6.7.2 and openWRT versions beyond 21.02 where the vulnerability is fixed. 3. Restrict local system access to trusted administrators only, minimizing the risk of attackers obtaining System privileges. 4. Implement strict access controls and monitoring on devices using affected MediaTek chipsets to detect anomalous driver behavior or privilege escalation attempts. 5. Conduct regular firmware audits and vulnerability assessments on wireless infrastructure to identify outdated or vulnerable components. 6. Employ network segmentation to isolate critical wireless devices, limiting lateral movement opportunities if compromise occurs. 7. Educate IT staff about the risks of local privilege escalation vulnerabilities and the importance of timely patching in embedded systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.396Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1aad66f5e62e3849363

Added to database: 11/4/2025, 6:48:10 AM

Last enriched: 11/11/2025, 7:26:36 AM

Last updated: 12/19/2025, 6:28:03 PM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats