CVE-2025-31712: cwe-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000/T8300/T9300
In cplog service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed.
AI Analysis
Technical Summary
CVE-2025-31712 is a medium-severity buffer overflow vulnerability identified in the cplog service of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC7731E, SC9832E, SC9863A, and multiple others widely used in mobile devices. The vulnerability arises from a classic buffer copy without checking the size of the input (CWE-120), leading to a possible out-of-bounds write. This flaw exists due to missing bounds checking in the cplog service, which is part of the firmware or low-level software stack running on these chipsets. Exploitation of this vulnerability can cause a local denial of service (DoS) condition by crashing or destabilizing the affected device. Notably, the vulnerability does not require any additional execution privileges or user interaction, but it is limited to local access, meaning an attacker must have local access to the device to trigger the flaw. The affected devices run Android versions 13, 14, and 15, indicating that the vulnerability impacts relatively recent Android-based devices using these Unisoc chipsets. The CVSS v3.1 base score is 5.1, reflecting a medium severity level primarily due to the local attack vector and lack of confidentiality impact. There are currently no known exploits in the wild, and no patches have been linked yet. The vulnerability could be leveraged by attackers with local access to cause device instability or denial of service, potentially disrupting device availability and user experience.
Potential Impact
For European organizations, the primary impact of CVE-2025-31712 lies in potential device instability and denial of service on devices using affected Unisoc chipsets running Android 13-15. This could affect mobile devices used by employees, particularly in sectors relying on mobile communications and field operations. While the vulnerability does not allow privilege escalation or data exfiltration, denial of service could disrupt business continuity, especially in critical communication scenarios. Organizations deploying mobile devices with these chipsets may face increased support costs and operational disruptions if devices become unstable or unusable. Additionally, if attackers gain local access to devices (e.g., through physical access or via compromised apps exploiting local interfaces), they could trigger the DoS condition, impacting availability. The lack of remote exploitability limits the threat surface but does not eliminate risk in environments where devices are physically accessible or used in less controlled settings. Overall, the impact is moderate but should not be ignored, especially for organizations with large deployments of affected devices or those in sensitive operational contexts.
Mitigation Recommendations
To mitigate CVE-2025-31712, organizations should: 1) Inventory and identify devices using the affected Unisoc chipsets and running Android 13-15 to assess exposure. 2) Monitor vendor and security advisories for patches or firmware updates from Unisoc or device manufacturers and apply them promptly once available. 3) Limit local access to devices by enforcing strict physical security controls and device usage policies to reduce the risk of local exploitation. 4) Employ mobile device management (MDM) solutions to monitor device health and detect abnormal crashes or instability that could indicate exploitation attempts. 5) Educate users on the importance of not installing untrusted applications or granting unnecessary permissions that could facilitate local access to the vulnerable service. 6) For high-security environments, consider restricting or isolating devices with these chipsets until patches are applied. 7) Engage with device vendors to request timely updates and confirm patch availability. These steps go beyond generic advice by focusing on device inventory, physical security, monitoring, and vendor engagement specific to this vulnerability and chipset family.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-31712: cwe-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000/T8300/T9300
Description
In cplog service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed.
AI-Powered Analysis
Technical Analysis
CVE-2025-31712 is a medium-severity buffer overflow vulnerability identified in the cplog service of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC7731E, SC9832E, SC9863A, and multiple others widely used in mobile devices. The vulnerability arises from a classic buffer copy without checking the size of the input (CWE-120), leading to a possible out-of-bounds write. This flaw exists due to missing bounds checking in the cplog service, which is part of the firmware or low-level software stack running on these chipsets. Exploitation of this vulnerability can cause a local denial of service (DoS) condition by crashing or destabilizing the affected device. Notably, the vulnerability does not require any additional execution privileges or user interaction, but it is limited to local access, meaning an attacker must have local access to the device to trigger the flaw. The affected devices run Android versions 13, 14, and 15, indicating that the vulnerability impacts relatively recent Android-based devices using these Unisoc chipsets. The CVSS v3.1 base score is 5.1, reflecting a medium severity level primarily due to the local attack vector and lack of confidentiality impact. There are currently no known exploits in the wild, and no patches have been linked yet. The vulnerability could be leveraged by attackers with local access to cause device instability or denial of service, potentially disrupting device availability and user experience.
Potential Impact
For European organizations, the primary impact of CVE-2025-31712 lies in potential device instability and denial of service on devices using affected Unisoc chipsets running Android 13-15. This could affect mobile devices used by employees, particularly in sectors relying on mobile communications and field operations. While the vulnerability does not allow privilege escalation or data exfiltration, denial of service could disrupt business continuity, especially in critical communication scenarios. Organizations deploying mobile devices with these chipsets may face increased support costs and operational disruptions if devices become unstable or unusable. Additionally, if attackers gain local access to devices (e.g., through physical access or via compromised apps exploiting local interfaces), they could trigger the DoS condition, impacting availability. The lack of remote exploitability limits the threat surface but does not eliminate risk in environments where devices are physically accessible or used in less controlled settings. Overall, the impact is moderate but should not be ignored, especially for organizations with large deployments of affected devices or those in sensitive operational contexts.
Mitigation Recommendations
To mitigate CVE-2025-31712, organizations should: 1) Inventory and identify devices using the affected Unisoc chipsets and running Android 13-15 to assess exposure. 2) Monitor vendor and security advisories for patches or firmware updates from Unisoc or device manufacturers and apply them promptly once available. 3) Limit local access to devices by enforcing strict physical security controls and device usage policies to reduce the risk of local exploitation. 4) Employ mobile device management (MDM) solutions to monitor device health and detect abnormal crashes or instability that could indicate exploitation attempts. 5) Educate users on the importance of not installing untrusted applications or granting unnecessary permissions that could facilitate local access to the vulnerable service. 6) For high-security environments, consider restricting or isolating devices with these chipsets until patches are applied. 7) Engage with device vendors to request timely updates and confirm patch availability. These steps go beyond generic advice by focusing on device inventory, physical security, monitoring, and vendor engagement specific to this vulnerability and chipset family.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-04-01T08:30:14.186Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683ee1eb182aa0cae2739636
Added to database: 6/3/2025, 11:52:11 AM
Last enriched: 7/11/2025, 6:47:28 AM
Last updated: 1/7/2026, 8:54:42 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.