Skip to main content

CVE-2025-31715: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152

Critical
VulnerabilityCVE-2025-31715cvecve-2025-31715cwe-77
Published: Mon Aug 18 2025 (08/18/2025, 00:34:30 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152

Description

In vowifi service, there is a possible command injection due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 08/18/2025, 01:02:52 UTC

Technical Analysis

CVE-2025-31715 is a critical command injection vulnerability identified in the vowifi (Voice over Wi-Fi) service of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets and modules, specifically models SL8521E, SL8521ET, SL8541E, UIS8141E, UWS6137, UWS6137E, UWS6151(E), and UWS6152. These components are integrated into devices running Mocor5, Android 8.1, and Android 9 operating systems. The vulnerability arises from improper neutralization of special elements in input data (CWE-77), allowing an attacker to inject arbitrary commands into the system. Notably, exploitation does not require any prior authentication or user interaction, and no additional execution privileges are needed, which significantly lowers the barrier for attackers. Successful exploitation could lead to remote escalation of privileges, granting attackers full control over the affected device's operating environment. The CVSS v3.1 base score of 9.8 reflects the critical severity, with high impact on confidentiality, integrity, and availability. The flaw is located in the vowifi service, which is responsible for enabling voice calls over Wi-Fi networks, a feature increasingly used to improve call quality and coverage. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical impact make this vulnerability a significant threat. The lack of available patches at the time of publication further exacerbates the risk. Given the widespread use of Unisoc chipsets in mobile devices, especially in budget and mid-range smartphones, this vulnerability could have broad implications.

Potential Impact

For European organizations, the impact of CVE-2025-31715 is substantial. Many enterprises and consumers rely on mobile devices equipped with Unisoc chipsets for communication, including VoWiFi services. An attacker exploiting this vulnerability could gain remote control over affected devices, potentially leading to data breaches, interception of sensitive communications, installation of persistent malware, or use of compromised devices as footholds into corporate networks. This is particularly concerning for sectors handling sensitive data such as finance, healthcare, and government agencies. The vulnerability could also disrupt availability of voice services, impacting business continuity. Furthermore, the ability to escalate privileges remotely without authentication means that attackers could operate stealthily and at scale, increasing the risk of widespread compromise. The absence of patches means organizations must rely on interim mitigations and heightened monitoring. The vulnerability also poses risks to consumer privacy and could undermine trust in mobile communication services across Europe.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Inventory and identify devices using affected Unisoc chipsets and vowifi services, prioritizing those running Mocor5, Android 8.1, and Android 9. 2) Restrict network access to vowifi services by implementing network segmentation and firewall rules that limit exposure to untrusted networks, especially Wi-Fi networks that could be exploited remotely. 3) Employ mobile device management (MDM) solutions to enforce security policies, disable vowifi features where feasible, or restrict their use to trusted environments. 4) Monitor network traffic for unusual command injection patterns or unexpected system commands originating from vowifi service processes. 5) Educate users about the risks of connecting to untrusted Wi-Fi networks and encourage use of VPNs to secure communications. 6) Collaborate with device vendors and Unisoc for timely patch deployment and firmware updates. 7) Implement anomaly detection and endpoint detection and response (EDR) tools to identify potential exploitation attempts. 8) Prepare incident response plans specifically addressing mobile device compromise scenarios related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2025-04-01T08:30:14.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a2782cad5a09ad009d9877

Added to database: 8/18/2025, 12:47:40 AM

Last enriched: 8/18/2025, 1:02:52 AM

Last updated: 8/22/2025, 12:34:57 AM

Views: 33

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats