Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61619: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-61619cvecve-2025-61619cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:35:58 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/08/2025, 08:47:26 UTC

Technical Analysis

CVE-2025-61619 identifies a vulnerability in the 5G NR modem firmware of Unisoc (Shanghai) Technologies Co., Ltd.'s T8100, T9100, T8200, and T8300 chipsets. These chipsets are integrated into various Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's handling of network data, which can be exploited remotely by an attacker to trigger a system crash, resulting in a denial of service (DoS). The vulnerability does not require any privileges or user interaction, making it easier to exploit over the network. The CVSS 3.1 base score of 7.5 reflects the high impact on availability, with no impact on confidentiality or integrity. The flaw could be triggered by specially crafted network packets sent to the modem, causing it to malfunction and crash the device or disrupt network connectivity. Although no exploits have been reported in the wild yet, the potential for remote DoS attacks poses a significant risk to device stability and service continuity. The lack of available patches at the time of publication necessitates vigilance and proactive mitigation by device manufacturers and users.

Potential Impact

For European organizations, this vulnerability could lead to significant disruptions in mobile communications, especially for enterprises relying on cellular connectivity for critical operations, such as remote work, IoT deployments, and mobile services. The denial of service could cause devices to crash or lose network connectivity, impacting operational continuity and potentially leading to productivity losses. Telecommunications providers using Unisoc chipsets in their network equipment or customer devices might face increased support costs and customer dissatisfaction. The impact is particularly relevant for sectors like finance, healthcare, and public services, where reliable mobile connectivity is essential. Additionally, the vulnerability could be exploited in targeted attacks against high-value individuals or organizations, amplifying its strategic risk. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.

Mitigation Recommendations

Organizations should monitor Unisoc and device manufacturers for firmware updates addressing CVE-2025-61619 and apply patches promptly once available. Until patches are released, network-level protections such as filtering or rate-limiting suspicious traffic targeting the modem interfaces may reduce exposure. Device administrators should audit and inventory devices using affected Unisoc chipsets to assess risk exposure. Employing mobile device management (MDM) solutions can facilitate rapid deployment of updates and configuration changes. Additionally, organizations should implement network segmentation to isolate critical systems from potentially vulnerable mobile devices. Security teams should enhance monitoring for unusual device crashes or connectivity losses that may indicate exploitation attempts. Collaboration with telecom providers to understand device chipset usage and coordinate mitigation efforts is advisable. Finally, educating users about the importance of timely updates and reporting connectivity issues can aid early detection and response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:27:04.800Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4909e7f98a81a7fa78f8

Added to database: 12/1/2025, 7:51:37 AM

Last enriched: 12/8/2025, 8:47:26 AM

Last updated: 1/17/2026, 8:13:59 PM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats