CVE-2025-31717: CWE-78 OS Command Injection in Unisoc (Shanghai) Technologies Co., Ltd. T750/T765/T760/T770/T820/S8000/T8300/T9300
In modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
AI Analysis
Technical Summary
CVE-2025-31717 is an OS command injection vulnerability classified under CWE-78, affecting multiple Unisoc modem chipsets (T750, T765, T760, T770, T820, S8000, T8300, T9300) integrated into devices running Android versions 13 through 16. The vulnerability stems from improper input validation within the modem's firmware or software stack, allowing an unauthenticated remote attacker to inject arbitrary OS commands. This can lead to a system crash, resulting in a denial of service (DoS) condition. The vulnerability does not require any user interaction or privileges, making it remotely exploitable over the network. The CVSS v3.1 score of 9.8 reflects the critical nature of the flaw, with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the potential for disruption is significant, especially in mobile devices relying on affected Unisoc chipsets. The modem's role as a communication interface means exploitation could disrupt cellular connectivity, impacting device availability and potentially exposing sensitive data if further exploitation chains are developed. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies by affected organizations.
Potential Impact
For European organizations, the impact of CVE-2025-31717 is substantial. The affected Unisoc chipsets are commonly found in a range of mobile devices, including smartphones and IoT devices, which are integral to business communications and operations. A successful exploitation could cause widespread denial of service, disrupting mobile connectivity and potentially halting critical communications. This is particularly concerning for sectors relying heavily on mobile networks such as telecommunications providers, emergency services, and enterprises with mobile-dependent workflows. The vulnerability's ability to be exploited remotely without authentication increases the attack surface, potentially allowing attackers to target devices en masse. Disruption of mobile services could also affect supply chains and customer-facing services, leading to financial losses and reputational damage. Furthermore, the high severity score indicates potential risks to data confidentiality and integrity, which could have regulatory implications under GDPR if personal data is compromised or service disruptions affect data availability.
Mitigation Recommendations
Given the absence of patches at the time of disclosure, European organizations should implement immediate compensating controls. These include: 1) Deploying network-level filtering and intrusion detection systems to monitor and block suspicious traffic targeting modem interfaces; 2) Restricting access to vulnerable devices by segmenting networks and applying strict firewall rules to limit exposure; 3) Collaborating with device vendors and Unisoc for timely patch releases and applying updates as soon as they become available; 4) Conducting thorough inventory and asset management to identify devices with affected chipsets and prioritize their protection; 5) Enhancing monitoring for anomalous device behavior indicative of exploitation attempts; 6) Educating IT and security teams about the vulnerability to ensure rapid response; 7) Considering temporary use of alternative devices or communication channels in critical environments until patches are deployed; 8) Engaging with mobile network operators to understand risk exposure and mitigation strategies at the network level.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland, Sweden
CVE-2025-31717: CWE-78 OS Command Injection in Unisoc (Shanghai) Technologies Co., Ltd. T750/T765/T760/T770/T820/S8000/T8300/T9300
Description
In modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
AI-Powered Analysis
Technical Analysis
CVE-2025-31717 is an OS command injection vulnerability classified under CWE-78, affecting multiple Unisoc modem chipsets (T750, T765, T760, T770, T820, S8000, T8300, T9300) integrated into devices running Android versions 13 through 16. The vulnerability stems from improper input validation within the modem's firmware or software stack, allowing an unauthenticated remote attacker to inject arbitrary OS commands. This can lead to a system crash, resulting in a denial of service (DoS) condition. The vulnerability does not require any user interaction or privileges, making it remotely exploitable over the network. The CVSS v3.1 score of 9.8 reflects the critical nature of the flaw, with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the potential for disruption is significant, especially in mobile devices relying on affected Unisoc chipsets. The modem's role as a communication interface means exploitation could disrupt cellular connectivity, impacting device availability and potentially exposing sensitive data if further exploitation chains are developed. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies by affected organizations.
Potential Impact
For European organizations, the impact of CVE-2025-31717 is substantial. The affected Unisoc chipsets are commonly found in a range of mobile devices, including smartphones and IoT devices, which are integral to business communications and operations. A successful exploitation could cause widespread denial of service, disrupting mobile connectivity and potentially halting critical communications. This is particularly concerning for sectors relying heavily on mobile networks such as telecommunications providers, emergency services, and enterprises with mobile-dependent workflows. The vulnerability's ability to be exploited remotely without authentication increases the attack surface, potentially allowing attackers to target devices en masse. Disruption of mobile services could also affect supply chains and customer-facing services, leading to financial losses and reputational damage. Furthermore, the high severity score indicates potential risks to data confidentiality and integrity, which could have regulatory implications under GDPR if personal data is compromised or service disruptions affect data availability.
Mitigation Recommendations
Given the absence of patches at the time of disclosure, European organizations should implement immediate compensating controls. These include: 1) Deploying network-level filtering and intrusion detection systems to monitor and block suspicious traffic targeting modem interfaces; 2) Restricting access to vulnerable devices by segmenting networks and applying strict firewall rules to limit exposure; 3) Collaborating with device vendors and Unisoc for timely patch releases and applying updates as soon as they become available; 4) Conducting thorough inventory and asset management to identify devices with affected chipsets and prioritize their protection; 5) Enhancing monitoring for anomalous device behavior indicative of exploitation attempts; 6) Educating IT and security teams about the vulnerability to ensure rapid response; 7) Considering temporary use of alternative devices or communication channels in critical environments until patches are deployed; 8) Engaging with mobile network operators to understand risk exposure and mitigation strategies at the network level.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-04-01T08:30:14.187Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e9a97654cfe91d8fe5c94b
Added to database: 10/11/2025, 12:48:54 AM
Last enriched: 10/11/2025, 1:03:44 AM
Last updated: 10/11/2025, 1:26:19 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11601: SQL Injection in SourceCodester Online Student Result System
MediumCVE-2025-11600: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-11597: SQL Injection in code-projects E-Commerce Website
MediumCVE-2025-11596: SQL Injection in code-projects E-Commerce Website
MediumCVE-2025-58301: CWE-121 Stack-based Buffer Overflow in Huawei HarmonyOS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.