Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31715: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152

0
Critical
VulnerabilityCVE-2025-31715cvecve-2025-31715cwe-77
Published: Mon Aug 18 2025 (08/18/2025, 00:34:30 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152

Description

In vowifi service, there is a possible command injection due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 08/25/2025, 01:14:31 UTC

Technical Analysis

CVE-2025-31715 is a critical command injection vulnerability identified in the vowifi (Voice over Wi-Fi) service implementations of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets and modules, including SL8521E, SL8521ET, SL8541E, UIS8141E, UWS6137, UWS6137E, UWS6151(E), and UWS6152. The affected versions run on Mocor5, Android 8.1, and Android 9 platforms. The root cause is improper neutralization of special elements in input data (CWE-77), which allows an attacker to inject arbitrary commands into the system. This vulnerability does not require any prior authentication or user interaction, making it remotely exploitable over the network. Successful exploitation can lead to remote escalation of privileges, granting the attacker full control over the affected device’s operating system environment. The CVSS v3.1 base score is 9.8, indicating a critical severity level with high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), meaning the vulnerability affects the same security scope. Although no known exploits are currently reported in the wild, the vulnerability’s characteristics make it a significant threat, especially for devices relying on these Unisoc chipsets for vowifi services. Given the integration of these chipsets in mobile devices and IoT equipment, exploitation could lead to full device compromise, data theft, service disruption, or lateral movement within networks.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, particularly for enterprises and service providers utilizing devices powered by Unisoc chipsets in their communication infrastructure or IoT deployments. Compromise of vowifi services can lead to interception or manipulation of voice communications, unauthorized access to sensitive corporate data, and potential disruption of critical communication channels. The remote and unauthenticated nature of the exploit increases the attack surface, enabling threat actors to target devices at scale without requiring physical access or user involvement. This is especially concerning for sectors such as telecommunications, healthcare, finance, and critical infrastructure, where secure and reliable voice communication is essential. Additionally, the vulnerability could be leveraged as a foothold for further network intrusion or espionage activities. The absence of patches at the time of publication further elevates the risk, necessitating immediate attention to mitigate potential exploitation.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level protections, including restricting access to vowifi service ports and interfaces through firewalls and network segmentation to limit exposure to untrusted networks. 2. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect anomalous command injection attempts targeting vowifi services. 3. Monitor device logs and network traffic for unusual command execution patterns or unexpected privilege escalations. 4. Coordinate with device manufacturers and Unisoc for timely release and deployment of security patches or firmware updates addressing this vulnerability. 5. Where possible, disable vowifi services on devices that do not require them or isolate such devices from critical network segments. 6. Implement strict input validation and sanitization controls at the application and middleware layers to prevent injection of malicious commands. 7. Conduct regular security audits and penetration testing focused on vowifi and related communication services to identify and remediate similar vulnerabilities proactively. 8. Educate IT and security teams about this vulnerability to ensure rapid detection and response to any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2025-04-01T08:30:14.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a2782cad5a09ad009d9877

Added to database: 8/18/2025, 12:47:40 AM

Last enriched: 8/25/2025, 1:14:31 AM

Last updated: 10/7/2025, 11:49:25 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats