Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20408: CWE-122 Heap Overflow in MediaTek, Inc. MT6890, MT7615, MT7915, MT7916, MT7981, MT7986

0
High
VulnerabilityCVE-2026-20408cvecve-2026-20408cwe-122
Published: Mon Feb 02 2026 (02/02/2026, 08:14:56 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT7615, MT7915, MT7916, MT7981, MT7986

Description

In wlan, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00461651; Issue ID: MSV-4758.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:51:41 UTC

Technical Analysis

CVE-2026-20408 is a heap buffer overflow vulnerability classified under CWE-122, found in the WLAN component of multiple MediaTek wireless chipsets including MT6890, MT7615, MT7915, MT7916, MT7981, and MT7986. The vulnerability arises due to an out-of-bounds write on the heap, which can be triggered remotely by an attacker located within wireless range (proximal or adjacent). No authentication or user interaction is required, making the attack vector highly accessible to nearby adversaries. Successful exploitation allows escalation of privileges on the device, potentially enabling full control over the affected system’s wireless functionality and possibly the underlying operating system. The affected software versions include SDK release 7.6.7.2 and earlier, as well as openWRT versions 19.07, 21.02, and 23.05, which are commonly used in embedded wireless devices and routers. The vulnerability has been assigned a CVSS v3.1 base score of 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. While no public exploits have been reported yet, the nature of the flaw and its accessibility make it a significant risk. The issue was reserved in November 2025 and published in February 2026, with MediaTek issuing a patch identified as WCNCR00461651. The vulnerability’s presence in widely deployed wireless chipsets underscores the importance of timely remediation.

Potential Impact

The impact of CVE-2026-20408 is substantial for organizations deploying affected MediaTek chipsets in wireless access points, routers, IoT devices, and embedded systems. Exploitation allows an attacker within wireless range to escalate privileges remotely without authentication or user interaction, potentially gaining control over device firmware or operating system components. This can lead to unauthorized access to network traffic, disruption of wireless services, injection of malicious code, or pivoting into internal networks. Confidentiality is at risk as attackers may intercept or manipulate sensitive data; integrity is compromised through unauthorized modifications; and availability may be affected by denial-of-service conditions caused by exploitation. Given the widespread use of MediaTek chipsets in consumer and enterprise wireless equipment, the vulnerability could facilitate large-scale attacks on network infrastructure, especially in environments with dense wireless deployments. The lack of known exploits in the wild currently provides a window for mitigation, but the ease of exploitation and high impact score indicate a critical threat if left unpatched.

Mitigation Recommendations

To mitigate CVE-2026-20408, organizations should immediately identify all devices using the affected MediaTek chipsets and verify their firmware or SDK versions. Applying the official patch WCNCR00461651 from MediaTek is the primary remediation step. For devices running openWRT, upgrading to versions beyond 23.05 or applying vendor-provided security updates is essential. Network administrators should also consider segmenting wireless networks to limit exposure and deploying wireless intrusion detection systems (WIDS) to monitor for anomalous activity indicative of exploitation attempts. Disabling unnecessary wireless services or features that utilize the vulnerable WLAN components can reduce attack surface. Additionally, enforcing strong physical security controls to limit attacker proximity and regularly auditing device firmware integrity can help detect and prevent exploitation. Vendors and integrators should prioritize firmware updates and communicate the urgency of patching to end users. Finally, organizations should incorporate this vulnerability into their risk management and incident response plans to ensure rapid detection and containment if exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.008Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806092f9fa50a62f0b3f7c

Added to database: 2/2/2026, 8:30:10 AM

Last enriched: 2/27/2026, 7:51:41 AM

Last updated: 3/24/2026, 10:26:31 AM

Views: 245

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses