Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61610: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-61610cvecve-2025-61610cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:36:02 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/08/2025, 08:46:37 UTC

Technical Analysis

CVE-2025-61610 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into mobile devices running Android versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of incoming data, which can be exploited remotely over the network without requiring any authentication or user interaction. Exploitation leads to a system crash, causing a denial of service (DoS) condition on the affected device. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the network attack vector, low attack complexity, and the complete lack of required privileges or user interaction. The vulnerability affects the availability of the device but does not compromise confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability is significant because the NR modem is critical for cellular communication, and a crash could disrupt voice, data, and emergency services. The lack of execution privileges needed for exploitation increases the risk profile, as attackers can trigger the DoS remotely. The vulnerability was reserved in late September 2025 and published in December 2025, indicating recent discovery and disclosure. The absence of patch links suggests that vendors and device manufacturers may still be developing mitigations. This vulnerability highlights the importance of robust input validation in modem firmware, especially as 5G NR technology becomes ubiquitous in mobile devices.

Potential Impact

For European organizations, the primary impact of CVE-2025-61610 is on the availability of mobile devices and potentially critical communication infrastructure relying on Unisoc chipsets. Organizations with mobile workforces or IoT deployments using affected devices may experience service disruptions due to modem crashes, impacting business continuity and operational efficiency. Telecommunications providers using Unisoc-based equipment could face network instability or degraded service quality. Emergency services and critical infrastructure relying on mobile connectivity could be particularly vulnerable to denial of service conditions, which may have safety implications. Although the vulnerability does not allow data theft or privilege escalation, the ability to remotely crash devices without authentication makes it a potent vector for targeted or widespread disruption attacks. The lack of known exploits in the wild currently reduces immediate risk, but the high severity score and ease of exploitation mean that attackers may develop exploits rapidly. European organizations must consider the potential for cascading effects on supply chains and mobile-dependent services. The impact is heightened in sectors such as finance, healthcare, and government, where mobile device availability is critical.

Mitigation Recommendations

1. Conduct a comprehensive inventory of all mobile devices and embedded systems using Unisoc T8100, T9100, T8200, or T8300 chipsets running Android 13 to 16 to identify at-risk assets. 2. Monitor vendor communications and security advisories from Unisoc and device manufacturers for patches or firmware updates addressing CVE-2025-61610 and apply them promptly upon release. 3. Implement network-level filtering and anomaly detection to identify and block suspicious NR modem traffic patterns that could trigger the vulnerability, especially from untrusted external sources. 4. Employ mobile device management (MDM) solutions to enforce security policies, restrict unnecessary network access, and enable rapid response to device crashes or instability. 5. Develop incident response plans that include procedures for handling modem-related denial of service events, ensuring continuity of critical communications. 6. Collaborate with telecommunications providers to understand the deployment of Unisoc chipsets in network equipment and coordinate mitigation efforts. 7. Educate users and administrators about the vulnerability and encourage reporting of unusual device behavior. 8. Consider network segmentation and redundancy for critical mobile-dependent systems to minimize impact from device outages. 9. Evaluate alternative hardware platforms for future deployments to reduce reliance on vulnerable chipsets. 10. Maintain up-to-date backups and recovery mechanisms for affected systems to reduce downtime in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:27:04.797Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa788c

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/8/2025, 8:46:37 AM

Last updated: 1/15/2026, 10:57:01 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats