Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31718: CWE-78 OS Command Injection in Unisoc (Shanghai) Technologies Co., Ltd. T606/T612/T616/T750/T765/T760/T770/T820/S8000/T8300/T9300

0
Critical
VulnerabilityCVE-2025-31718cvecve-2025-31718cwe-78
Published: Sat Oct 11 2025 (10/11/2025, 00:26:52 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T606/T612/T616/T750/T765/T760/T770/T820/S8000/T8300/T9300

Description

In modem, there is a possible system crash due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 10/11/2025, 01:03:29 UTC

Technical Analysis

CVE-2025-31718 is a critical OS command injection vulnerability identified in the modem firmware of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including T606, T612, T616, T750, T765, T760, T770, T820, S8000, T8300, and T9300. These chipsets are integrated into a range of Android devices running versions 13 through 16. The vulnerability stems from improper input validation within the modem subsystem, which processes commands or data inputs. This flaw allows an unauthenticated remote attacker to inject arbitrary OS commands, potentially causing system crashes and enabling remote escalation of privileges without requiring any additional execution privileges or user interaction. The CVSS v3.1 base score of 9.8 reflects the vulnerability's critical nature, with attack vector being network-based, no privileges required, no user interaction needed, and full impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant risk due to the widespread use of affected chipsets in mobile devices. The lack of available patches at the time of publication necessitates urgent attention from device manufacturers and users. The vulnerability is cataloged under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), a common and dangerous class of injection flaws that can lead to complete system compromise.

Potential Impact

For European organizations, this vulnerability presents a substantial threat, especially those relying heavily on mobile communications and Android devices embedded with Unisoc chipsets. Exploitation could lead to unauthorized remote control over affected devices, data breaches, disruption of mobile services, and potential lateral movement within corporate networks. Critical sectors such as telecommunications, finance, government, and healthcare could face severe operational disruptions and data confidentiality breaches. The ability to escalate privileges remotely without authentication or user interaction increases the attack surface and lowers the barrier for exploitation. Additionally, the potential for system crashes could result in denial-of-service conditions, impacting availability of essential services. Given the integration of these chipsets in consumer and enterprise mobile devices, the scope of affected systems is broad, potentially affecting both end-user devices and enterprise mobile endpoints. This could also impact mobile network operators and service providers who manage devices with these chipsets, increasing the risk of widespread service degradation or compromise.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls to restrict unauthorized access to modem interfaces, including implementing strict firewall rules and network segmentation to isolate vulnerable devices. Organizations should monitor network traffic for unusual command injection patterns targeting modems. Device manufacturers and vendors must prioritize the development and deployment of firmware patches addressing the input validation flaw. Until patches are available, disabling or limiting remote modem management features where feasible can reduce exposure. Enterprises should enforce strict mobile device management (MDM) policies to control device configurations and update cycles. Regular security audits and vulnerability scanning of mobile endpoints can help identify devices with vulnerable chipsets. Additionally, educating users about the risks and encouraging prompt installation of security updates once released will be critical. Collaboration with mobile network operators to detect and mitigate exploitation attempts at the network level can further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2025-04-01T08:30:14.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e9a97654cfe91d8fe5c94e

Added to database: 10/11/2025, 12:48:54 AM

Last enriched: 10/11/2025, 1:03:29 AM

Last updated: 10/11/2025, 1:26:25 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats