Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31717: CWE-78 OS Command Injection in Unisoc (Shanghai) Technologies Co., Ltd. T750/T765/T760/T770/T820/S8000/T8300/T9300

0
Critical
VulnerabilityCVE-2025-31717cvecve-2025-31717cwe-78
Published: Sat Oct 11 2025 (10/11/2025, 00:26:51 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T750/T765/T760/T770/T820/S8000/T8300/T9300

Description

In modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 10/11/2025, 01:03:44 UTC

Technical Analysis

CVE-2025-31717 is an OS command injection vulnerability classified under CWE-78, affecting multiple Unisoc modem chipsets (T750, T765, T760, T770, T820, S8000, T8300, T9300) integrated into devices running Android versions 13 through 16. The vulnerability stems from improper input validation within the modem's firmware or software stack, allowing an unauthenticated remote attacker to inject arbitrary OS commands. This can lead to a system crash, resulting in a denial of service (DoS) condition. The vulnerability does not require any user interaction or privileges, making it remotely exploitable over the network. The CVSS v3.1 score of 9.8 reflects the critical nature of the flaw, with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the potential for disruption is significant, especially in mobile devices relying on affected Unisoc chipsets. The modem's role as a communication interface means exploitation could disrupt cellular connectivity, impacting device availability and potentially exposing sensitive data if further exploitation chains are developed. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies by affected organizations.

Potential Impact

For European organizations, the impact of CVE-2025-31717 is substantial. The affected Unisoc chipsets are commonly found in a range of mobile devices, including smartphones and IoT devices, which are integral to business communications and operations. A successful exploitation could cause widespread denial of service, disrupting mobile connectivity and potentially halting critical communications. This is particularly concerning for sectors relying heavily on mobile networks such as telecommunications providers, emergency services, and enterprises with mobile-dependent workflows. The vulnerability's ability to be exploited remotely without authentication increases the attack surface, potentially allowing attackers to target devices en masse. Disruption of mobile services could also affect supply chains and customer-facing services, leading to financial losses and reputational damage. Furthermore, the high severity score indicates potential risks to data confidentiality and integrity, which could have regulatory implications under GDPR if personal data is compromised or service disruptions affect data availability.

Mitigation Recommendations

Given the absence of patches at the time of disclosure, European organizations should implement immediate compensating controls. These include: 1) Deploying network-level filtering and intrusion detection systems to monitor and block suspicious traffic targeting modem interfaces; 2) Restricting access to vulnerable devices by segmenting networks and applying strict firewall rules to limit exposure; 3) Collaborating with device vendors and Unisoc for timely patch releases and applying updates as soon as they become available; 4) Conducting thorough inventory and asset management to identify devices with affected chipsets and prioritize their protection; 5) Enhancing monitoring for anomalous device behavior indicative of exploitation attempts; 6) Educating IT and security teams about the vulnerability to ensure rapid response; 7) Considering temporary use of alternative devices or communication channels in critical environments until patches are deployed; 8) Engaging with mobile network operators to understand risk exposure and mitigation strategies at the network level.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2025-04-01T08:30:14.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e9a97654cfe91d8fe5c94b

Added to database: 10/11/2025, 12:48:54 AM

Last enriched: 10/11/2025, 1:03:44 AM

Last updated: 10/11/2025, 1:26:19 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats