CVE-2025-20794: CWE-121 Stack Overflow in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689259 / MOLY01586470; Issue ID: MSV-4847.
AI Analysis
Technical Summary
CVE-2025-20794 is a stack overflow vulnerability classified under CWE-121 affecting a broad range of MediaTek modem chipsets (including MT2735 through MT8893 series). The vulnerability stems from improper input validation in the modem firmware when processing signals from base stations. An attacker operating a rogue base station can exploit this flaw by sending crafted signals to a User Equipment (UE) device containing the vulnerable MediaTek modem, causing a stack overflow that leads to a system crash and denial of service. The attack vector is remote with no privileges or user interaction required, increasing the risk of exploitation in environments where devices connect to untrusted or malicious base stations. The affected modem versions include NR15, NR16, NR17, and NR17R. The CVSS v3.1 score is 6.5 (medium severity) with an attack vector of adjacent network, low attack complexity, no privileges required, no user interaction, and impact limited to availability (device crash). Although no exploits have been observed in the wild, the vulnerability poses a significant risk to device availability, particularly in mobile networks. MediaTek has released patches identified as MOLY01689259 and MOLY01586470 to address this issue. The vulnerability’s scope covers a wide range of mobile devices using these chipsets, potentially affecting millions of users globally. The root cause is a classic stack buffer overflow due to insufficient input validation, which could be mitigated by improved input sanitization and bounds checking in modem firmware.
Potential Impact
For European organizations, the primary impact of CVE-2025-20794 is on availability. Devices using affected MediaTek modems may crash when connecting to rogue base stations, leading to service interruptions for end users. This can disrupt mobile communications, impacting critical sectors such as emergency services, financial institutions relying on mobile connectivity, and industrial IoT deployments. Telecom operators could face increased support costs and reputational damage if widespread exploitation occurs. The vulnerability could also be leveraged in targeted denial-of-service campaigns against specific users or geographic areas by deploying rogue base stations. Although confidentiality and integrity are not directly affected, the loss of availability in mobile devices can have cascading effects on business continuity and operational resilience. European enterprises with BYOD policies or mobile workforce using vulnerable devices are at risk of productivity loss. The lack of required user interaction or privileges makes the attack easier to execute in hostile environments, such as public spaces or border regions. The broad range of affected chipsets increases the potential attack surface across multiple device manufacturers and models.
Mitigation Recommendations
1. Deploy the official patches from MediaTek (MOLY01689259 / MOLY01586470) as soon as they become available for affected devices. 2. Telecom operators should implement network monitoring to detect and block rogue base stations, using anomaly detection and signal fingerprinting techniques. 3. End users and enterprises should update device firmware and baseband software regularly to incorporate security fixes. 4. Organizations should enforce strict mobile device management (MDM) policies to control device updates and monitor device health. 5. Consider deploying network access control (NAC) solutions that can identify suspicious network behavior indicative of rogue base stations. 6. Educate users about the risks of connecting to untrusted networks and encourage the use of VPNs or secure communication channels. 7. Collaborate with mobile network providers to share threat intelligence related to rogue base station activity. 8. For critical infrastructure, implement redundancy and failover mechanisms to mitigate potential service disruptions caused by device crashes. 9. Conduct penetration testing and red team exercises simulating rogue base station attacks to assess organizational readiness. 10. Maintain an inventory of devices with affected MediaTek chipsets to prioritize patching and monitoring efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Austria
CVE-2025-20794: CWE-121 Stack Overflow in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689259 / MOLY01586470; Issue ID: MSV-4847.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20794 is a stack overflow vulnerability classified under CWE-121 affecting a broad range of MediaTek modem chipsets (including MT2735 through MT8893 series). The vulnerability stems from improper input validation in the modem firmware when processing signals from base stations. An attacker operating a rogue base station can exploit this flaw by sending crafted signals to a User Equipment (UE) device containing the vulnerable MediaTek modem, causing a stack overflow that leads to a system crash and denial of service. The attack vector is remote with no privileges or user interaction required, increasing the risk of exploitation in environments where devices connect to untrusted or malicious base stations. The affected modem versions include NR15, NR16, NR17, and NR17R. The CVSS v3.1 score is 6.5 (medium severity) with an attack vector of adjacent network, low attack complexity, no privileges required, no user interaction, and impact limited to availability (device crash). Although no exploits have been observed in the wild, the vulnerability poses a significant risk to device availability, particularly in mobile networks. MediaTek has released patches identified as MOLY01689259 and MOLY01586470 to address this issue. The vulnerability’s scope covers a wide range of mobile devices using these chipsets, potentially affecting millions of users globally. The root cause is a classic stack buffer overflow due to insufficient input validation, which could be mitigated by improved input sanitization and bounds checking in modem firmware.
Potential Impact
For European organizations, the primary impact of CVE-2025-20794 is on availability. Devices using affected MediaTek modems may crash when connecting to rogue base stations, leading to service interruptions for end users. This can disrupt mobile communications, impacting critical sectors such as emergency services, financial institutions relying on mobile connectivity, and industrial IoT deployments. Telecom operators could face increased support costs and reputational damage if widespread exploitation occurs. The vulnerability could also be leveraged in targeted denial-of-service campaigns against specific users or geographic areas by deploying rogue base stations. Although confidentiality and integrity are not directly affected, the loss of availability in mobile devices can have cascading effects on business continuity and operational resilience. European enterprises with BYOD policies or mobile workforce using vulnerable devices are at risk of productivity loss. The lack of required user interaction or privileges makes the attack easier to execute in hostile environments, such as public spaces or border regions. The broad range of affected chipsets increases the potential attack surface across multiple device manufacturers and models.
Mitigation Recommendations
1. Deploy the official patches from MediaTek (MOLY01689259 / MOLY01586470) as soon as they become available for affected devices. 2. Telecom operators should implement network monitoring to detect and block rogue base stations, using anomaly detection and signal fingerprinting techniques. 3. End users and enterprises should update device firmware and baseband software regularly to incorporate security fixes. 4. Organizations should enforce strict mobile device management (MDM) policies to control device updates and monitor device health. 5. Consider deploying network access control (NAC) solutions that can identify suspicious network behavior indicative of rogue base stations. 6. Educate users about the risks of connecting to untrusted networks and encourage the use of VPNs or secure communication channels. 7. Collaborate with mobile network providers to share threat intelligence related to rogue base station activity. 8. For critical infrastructure, implement redundancy and failover mechanisms to mitigate potential service disruptions caused by device crashes. 9. Conduct penetration testing and red team exercises simulating rogue base station attacks to assess organizational readiness. 10. Maintain an inventory of devices with affected MediaTek chipsets to prioritize patching and monitoring efforts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.403Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695c6e7a3839e44175bdd3d9
Added to database: 1/6/2026, 2:07:54 AM
Last enriched: 2/18/2026, 8:55:38 AM
Last updated: 3/25/2026, 2:52:03 AM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.