Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20794: CWE-121 Stack Overflow in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2025-20794cvecve-2025-20794cwe-121
Published: Tue Jan 06 2026 (01/06/2026, 01:46:31 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689259 / MOLY01586470; Issue ID: MSV-4847.

AI-Powered Analysis

AILast updated: 01/06/2026, 02:26:18 UTC

Technical Analysis

CVE-2025-20794 is a stack overflow vulnerability classified under CWE-121 found in the modem firmware of a wide array of MediaTek chipsets, including models MT2735 through MT8893. The vulnerability stems from improper input validation within the modem component, which can be exploited by an attacker controlling a rogue base station. When a user equipment (UE) device connects to such a malicious base station, specially crafted inputs can trigger a stack overflow, leading to a system crash and resulting in a denial of service condition. Notably, exploitation does not require any user interaction or elevated privileges, making it easier for attackers to execute remotely. The affected modem firmware versions include NR15, NR16, NR17, and NR17R. Although no public exploits have been observed, the vulnerability's nature and the extensive list of affected chipsets pose a considerable threat. The issue was reserved in November 2024 and published in January 2026, with patches identified as MOLY01689259 and MOLY01586470. The vulnerability impacts the availability of devices using these modems, potentially disrupting communications and services dependent on them. This is particularly critical for mobile network operators, IoT deployments, and any infrastructure relying on MediaTek modems. The lack of a CVSS score necessitates a severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, the primary impact of CVE-2025-20794 is the potential for remote denial of service on devices using affected MediaTek modems. This could disrupt mobile communications, IoT device functionality, and critical infrastructure relying on cellular connectivity. Telecommunications providers may experience network instability or service outages if large numbers of devices are affected simultaneously. Enterprises deploying IoT solutions with these chipsets could see operational interruptions, affecting manufacturing, logistics, or smart city applications. The vulnerability could also be leveraged to degrade service availability in targeted attacks, impacting sectors such as finance, healthcare, and emergency services that depend on reliable mobile connectivity. Since exploitation requires connection to a rogue base station, attackers with the capability to deploy such infrastructure could selectively disrupt communications in specific geographic areas. This raises concerns for public safety and national security, especially in countries with advanced 5G deployments and dense urban populations. The broad chipset coverage means many consumer and industrial devices are at risk, amplifying the potential scale of impact across Europe.

Mitigation Recommendations

European organizations should prioritize the following mitigations: 1) Coordinate with device manufacturers and mobile network operators to ensure timely deployment of patches MOLY01689259 and MOLY01586470 to affected devices and modems. 2) Implement network-level detection and prevention mechanisms to identify and block rogue base stations, including the use of IMSI catchers detection tools and anomaly-based monitoring. 3) Enforce strict base station authentication and integrity checks within mobile networks to reduce the risk of rogue station connections. 4) For IoT deployments, segment networks and apply strict access controls to limit exposure of vulnerable devices. 5) Educate security teams about the threat vector involving rogue base stations and monitor for unusual device behavior or connectivity issues. 6) Collaborate with telecom regulators and industry groups to share threat intelligence and coordinate responses. 7) Consider deploying endpoint security solutions capable of detecting modem firmware anomalies or crashes. 8) Maintain an inventory of devices using affected MediaTek chipsets to assess exposure and prioritize remediation. These steps go beyond generic patching by addressing the unique exploitation vector involving rogue base stations and enhancing overall network resilience.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.403Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3d9

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/6/2026, 2:26:18 AM

Last updated: 1/8/2026, 12:24:56 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats