Skip to main content

CVE-2025-31716: cwe-121 Stack-based Buffer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000

Medium
VulnerabilityCVE-2025-31716cvecve-2025-31716cwe-121
Published: Fri Aug 01 2025 (08/01/2025, 05:55:00 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000

Description

In bootloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 08/01/2025, 06:18:14 UTC

Technical Analysis

CVE-2025-31716 is a medium-severity stack-based buffer overflow vulnerability identified in the bootloader component of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC7731E, SC9832E, SC9863A, and multiple T-series models (T310, T606, T612, T616, T610, T618, T750, T765, T760, T770, T820, S8000). The vulnerability arises from a missing bounds check during a write operation in the bootloader, leading to an out-of-bounds write condition. This flaw is classified under CWE-121 (Stack-based Buffer Overflow). Exploitation of this vulnerability does not require any privileges or user interaction, but it is limited to local access, meaning an attacker must have local code execution or physical access to the device. The primary impact is a denial of service (DoS) condition, where the device may crash or become unresponsive due to corrupted memory in the bootloader stage. There is no indication that this vulnerability allows privilege escalation or arbitrary code execution. The affected devices run Android versions 13, 14, and 15, indicating that this vulnerability impacts relatively recent Android-based devices using Unisoc chipsets. No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS v3.1 base score is 5.1, reflecting medium severity, with the vector indicating local attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, low integrity impact, and low availability impact.

Potential Impact

For European organizations, the impact of CVE-2025-31716 primarily concerns devices embedding Unisoc chipsets running Android 13 to 15. These devices are commonly found in budget smartphones, IoT devices, and embedded systems. A local denial of service in the bootloader can cause device unavailability, potentially disrupting operations if these devices are used in critical communication, authentication, or operational technology roles. Although the vulnerability does not allow remote exploitation or privilege escalation, the requirement for local access limits the attack surface. However, in environments where devices are physically accessible or where local code execution can be achieved (e.g., via malicious apps or insider threats), this vulnerability could be leveraged to cause device downtime. This may affect sectors relying on mobile or embedded devices for secure communications, field operations, or user authentication. The lack of confidentiality impact reduces the risk of data leakage, but integrity and availability impacts could affect system reliability and user trust.

Mitigation Recommendations

Mitigation should focus on minimizing local access to vulnerable devices and monitoring for abnormal device behavior indicative of bootloader crashes or reboots. Organizations should: 1) Inventory and identify devices using affected Unisoc chipsets and Android versions 13-15. 2) Restrict physical access to devices, especially in sensitive environments, to prevent local exploitation. 3) Implement mobile device management (MDM) solutions to monitor device health and detect unusual reboots or failures. 4) Engage with device manufacturers and Unisoc for timely patches or firmware updates addressing this vulnerability. 5) Where possible, disable or restrict bootloader access or debugging interfaces to reduce attack vectors. 6) Educate users and administrators about the risks of installing untrusted local applications that might exploit local vulnerabilities. 7) Prepare incident response plans for device unavailability scenarios caused by bootloader failures. These steps go beyond generic advice by focusing on physical security, device management, and proactive monitoring tailored to the nature of this local DoS vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2025-04-01T08:30:14.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688c58c0ad5a09ad00c5e706

Added to database: 8/1/2025, 6:03:44 AM

Last enriched: 8/1/2025, 6:18:14 AM

Last updated: 8/2/2025, 12:34:24 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats