Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61615: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-61615cvecve-2025-61615cwe-20
Published: Mon Mar 09 2026 (03/09/2026, 09:02:26 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:44:24 UTC

Technical Analysis

CVE-2025-61615 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into various Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of network data, which can be manipulated by an attacker remotely to trigger a system crash. This crash leads to a denial of service condition, disrupting normal device operation without requiring any privileges or user interaction. The vulnerability does not affect confidentiality or integrity but severely impacts availability. The CVSS v3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) indicates that the attack can be launched over the network with low complexity and no authentication, making it a significant risk for affected devices. Although no exploits have been observed in the wild and no patches are currently available, the vulnerability's presence in widely used chipsets embedded in mobile devices makes it a critical concern for device manufacturers, network operators, and end users. The lack of patches necessitates interim mitigations and heightened monitoring until a fix is released.

Potential Impact

The primary impact of CVE-2025-61615 is a remote denial of service on devices using affected Unisoc chipsets, which can cause system crashes and device unavailability. This can disrupt communications, especially for users relying on mobile networks for critical services. Enterprises deploying large fleets of Android devices with these chipsets may experience operational interruptions, impacting productivity and service delivery. The vulnerability does not allow data theft or privilege escalation, limiting its impact to availability. However, widespread exploitation could lead to network congestion or targeted attacks against specific user groups or regions. The ease of remote exploitation without authentication increases the risk of automated attacks. The absence of patches prolongs exposure, potentially affecting millions of devices globally, especially in regions where Unisoc chipsets have significant market penetration.

Mitigation Recommendations

1. Monitor vendor advisories closely for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2. Implement network-level filtering to restrict or monitor suspicious NR modem traffic that could trigger the vulnerability, using anomaly detection systems. 3. Employ mobile device management (MDM) solutions to detect and isolate affected devices exhibiting crash symptoms or instability. 4. Encourage users to reboot devices regularly to recover from potential crashes and reduce persistent denial of service. 5. Collaborate with mobile network operators to identify and block exploit attempts at the network edge. 6. For organizations deploying custom ROMs or firmware, consider additional input validation checks in the modem stack as a temporary mitigation. 7. Educate users about the risk and advise caution when connecting to untrusted networks until patches are available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:27:04.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ae8de22904315ca3e9d006

Added to database: 3/9/2026, 9:07:46 AM

Last enriched: 3/16/2026, 9:44:24 AM

Last updated: 4/28/2026, 5:14:50 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses