Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61611: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. UDX710

0
High
VulnerabilityCVE-2025-61611cvecve-2025-61611cwe-20
Published: Mon Mar 09 2026 (03/09/2026, 09:02:21 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: UDX710

Description

In modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed..

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:43:18 UTC

Technical Analysis

CVE-2025-61611 identifies a security vulnerability in the modem component of the Unisoc (Shanghai) Technologies Co., Ltd. UDX710 chipset, specifically affecting devices running the Yocto operating system. The root cause is improper input validation (CWE-20), which allows an attacker to send specially crafted inputs to the modem, triggering a denial of service condition remotely. This vulnerability does not require any privileges or user interaction, making it easier to exploit over a network. The impact is limited to availability, as the flaw can cause the modem to crash or become unresponsive, disrupting communication services. The CVSS v3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) indicates a high severity due to the network attack vector, low attack complexity, no required privileges or user interaction, and a high impact on availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and assigned a CVE identifier. The affected product, UDX710, is a chipset commonly used in mobile devices and IoT equipment, particularly in markets where Unisoc has significant penetration. The vulnerability’s presence in the modem firmware or software stack could allow attackers to disrupt device connectivity remotely, potentially impacting critical communications and services.

Potential Impact

The primary impact of CVE-2025-61611 is a remote denial of service on devices using the Unisoc UDX710 modem running Yocto. This can lead to loss of network connectivity, disrupting voice, data, and IoT communications. Organizations relying on affected devices may experience service outages, degraded user experience, and operational interruptions. Critical infrastructure or enterprise environments using such devices could face increased downtime or loss of communication channels, affecting business continuity. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can be significant, especially in sectors like telecommunications, industrial IoT, and mobile networks. The ease of exploitation without authentication or user interaction increases the risk of widespread attacks if threat actors develop exploits. The absence of patches means affected organizations must rely on interim mitigations, increasing exposure duration.

Mitigation Recommendations

1. Monitor Unisoc and Yocto project advisories closely for official patches or firmware updates addressing CVE-2025-61611 and apply them promptly once available. 2. Implement network-level protections such as firewalls and intrusion prevention systems (IPS) to restrict and monitor traffic to modem interfaces, blocking suspicious or malformed packets that could trigger the vulnerability. 3. Employ network segmentation to isolate devices with Unisoc UDX710 modems from critical infrastructure to limit potential impact. 4. Use anomaly detection tools to identify unusual modem behavior or connectivity disruptions indicative of exploitation attempts. 5. Coordinate with device vendors and service providers to confirm affected device inventories and update firmware where possible. 6. Consider deploying temporary mitigations such as disabling unnecessary remote access to vulnerable modems or applying rate limiting to reduce attack surface. 7. Maintain robust incident response plans to quickly address potential denial of service incidents affecting communications. These steps go beyond generic advice by focusing on network controls, vendor coordination, and proactive monitoring tailored to the specific nature of this modem input validation flaw.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:27:04.798Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ae8de22904315ca3e9cffa

Added to database: 3/9/2026, 9:07:46 AM

Last enriched: 3/16/2026, 9:43:18 AM

Last updated: 4/28/2026, 12:07:13 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses