Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20750: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

0
Medium
VulnerabilityCVE-2025-20750cvecve-2025-20750cwe-476
Published: Tue Dec 02 2025 (12/02/2025, 02:34:23 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

Description

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01661199; Issue ID: MSV-4296.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 08:51:50 UTC

Technical Analysis

CVE-2025-20750 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting a broad range of MediaTek modem chipsets, including models MT2735, MT6833, MT6853, MT6873, MT6880, MT6890, MT8675, MT8771, MT8791, and others. The vulnerability resides in the modem firmware's input validation logic, where improper handling of certain inputs can cause the modem software to dereference a NULL pointer, leading to a system crash. This crash results in a denial of service condition on the affected device. The exploit scenario involves a user equipment (UE) device connecting to a malicious or rogue base station controlled by an attacker. Because the attack vector is over the air and requires no user interaction or privileges, it is relatively easy to exploit in a targeted environment. The vulnerability impacts the availability of the modem subsystem but does not affect confidentiality or integrity. The CVSS v3.1 score is 6.5 (medium severity), with attack vector being adjacent network (the cellular network), low attack complexity, no privileges required, and no user interaction. MediaTek has assigned patch ID MOLY01661199 to address this issue. The vulnerability was publicly disclosed on December 2, 2025, and no known exploits have been reported in the wild as of now. The broad range of affected chipsets indicates a widespread potential impact across many devices using MediaTek modems, including smartphones, IoT devices, and telecom equipment.

Potential Impact

For European organizations, the primary impact of CVE-2025-20750 is the potential for remote denial of service on devices utilizing the affected MediaTek modem chipsets. This can disrupt mobile communications, degrade service availability, and potentially impact critical infrastructure relying on cellular connectivity. Telecom operators, mobile network providers, and enterprises deploying IoT or mobile devices with these chipsets may experience service interruptions or degraded network performance. The lack of confidentiality or integrity impact limits the risk of data breaches, but availability disruptions can affect business continuity, emergency services, and operational technology systems. The vulnerability's exploitation via rogue base stations is particularly concerning in urban and industrial areas where attackers could deploy such infrastructure. European countries with advanced 4G/5G networks and high penetration of MediaTek-based devices are at greater risk. The absence of user interaction or privileges lowers the barrier for attackers to cause widespread denial of service, emphasizing the need for timely patching and network monitoring.

Mitigation Recommendations

European organizations should implement the following specific mitigation measures: 1) Identify and inventory all devices using affected MediaTek modem chipsets, including smartphones, IoT devices, and telecom equipment. 2) Apply the official MediaTek patch (MOLY01661199) as soon as it becomes available from device manufacturers or vendors. 3) Collaborate with mobile network operators to detect and block rogue base stations using network anomaly detection tools and radio frequency monitoring. 4) Employ network-level protections such as base station authentication enhancements and anomaly detection to prevent unauthorized base station connections. 5) For critical infrastructure, consider deploying fallback communication channels or redundant connectivity to mitigate potential DoS impacts. 6) Educate security teams on monitoring cellular network logs for signs of suspicious base station activity. 7) Engage with device vendors to ensure firmware updates are distributed promptly. 8) Implement strict access controls and segmentation for devices relying on cellular connectivity to limit the blast radius of potential DoS attacks. These targeted actions go beyond generic patching advice and address the unique attack vector involving rogue base stations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.396Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57aff2f793a7de7f5ef6

Added to database: 12/2/2025, 3:06:23 AM

Last enriched: 2/18/2026, 8:51:50 AM

Last updated: 3/24/2026, 10:16:24 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses