Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20751: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

0
Medium
VulnerabilityCVE-2025-20751cvecve-2025-20751cwe-787
Published: Tue Dec 02 2025 (12/02/2025, 02:34:21 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

Description

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01661195; Issue ID: MSV-4297.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:37:48 UTC

Technical Analysis

CVE-2025-20751 is a medium-severity vulnerability classified as an out-of-bounds write (CWE-787) in the modem firmware of numerous MediaTek chipsets, specifically versions identified as Modem NR15. The vulnerability arises from a missing bounds check in the modem's processing logic, which can be triggered remotely when a user equipment (UE) device connects to a rogue base station controlled by an attacker. This out-of-bounds write can cause the modem system to crash, resulting in a denial of service condition. The attack vector requires network-level access to the cellular connection but does not require any user interaction or elevated privileges, making it a relatively straightforward attack if the attacker can establish a rogue base station. The affected chipsets span a wide range of MediaTek's modem products, including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797. The vulnerability was published on December 2, 2025, with a CVSS v3.1 score of 5.3, reflecting a network attack vector with high attack complexity and low privileges required, but only impacting availability. MediaTek has released a patch identified as MOLY01661195 to address this issue. No exploits have been reported in the wild to date. The vulnerability primarily threatens the availability of devices relying on these modems, potentially disrupting communications and services dependent on cellular connectivity.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of cellular-connected devices and infrastructure. Telecommunications providers using affected MediaTek modems in their network equipment or customer premises equipment (CPE) could experience service disruptions if attackers deploy rogue base stations to trigger modem crashes. Critical sectors such as emergency services, transportation, and industrial IoT deployments relying on cellular connectivity may face operational interruptions. Enterprises using mobile devices or embedded systems with these chipsets could see degraded service or device reboots, impacting business continuity. Although the vulnerability does not compromise confidentiality or integrity, the denial of service effect could be leveraged in targeted attacks to disrupt communications during critical periods. The medium severity rating reflects the limited scope of impact but acknowledges the potential for significant operational disruption in environments with high dependency on cellular connectivity.

Mitigation Recommendations

Organizations should prioritize applying the MediaTek patch MOLY01661195 to all affected devices and modems running Modem NR15 firmware. Network operators should monitor for unauthorized or rogue base stations within their coverage areas using radio frequency monitoring tools and anomaly detection systems to prevent attackers from establishing malicious access points. Deploying network-level protections such as base station authentication and integrity verification can reduce the risk of rogue base station connections. Device manufacturers and integrators should verify firmware versions and enforce update policies to ensure vulnerable modems are upgraded promptly. For critical infrastructure, implementing redundancy in communication channels and failover mechanisms can mitigate the impact of potential denial of service events. Security teams should also educate users and administrators about the risks of connecting to untrusted cellular networks and encourage vigilance for unusual connectivity issues. Finally, collaboration with telecom providers to share threat intelligence on rogue base station activity can enhance detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.396Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57aff2f793a7de7f5ef9

Added to database: 12/2/2025, 3:06:23 AM

Last enriched: 12/9/2025, 4:37:48 AM

Last updated: 1/18/2026, 4:56:34 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats