Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910

0
Medium
VulnerabilityCVE-2026-20419cvecve-2026-20419cwe-754
Published: Mon Feb 02 2026 (02/02/2026, 08:16:46 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910

Description

In wlan AP/STA firmware, there is a possible system becoming irresponsive due to an uncaught exception. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00461663 / WCNCR00463309; Issue ID: MSV-4852.

AI-Powered Analysis

AILast updated: 02/02/2026, 08:45:24 UTC

Technical Analysis

CVE-2026-20419 is a firmware vulnerability affecting a broad range of MediaTek wireless chipsets used in access points (AP) and station (STA) devices. The root cause is an improper check for unusual or exceptional conditions (CWE-754) within the WLAN firmware, which leads to uncaught exceptions. When these exceptions occur, the affected device's system can become unresponsive, effectively causing a denial of service (DoS). The vulnerability can be triggered remotely by an attacker located within wireless range, without requiring any user interaction or elevated privileges. This means that simply sending crafted wireless frames or packets that induce the exceptional condition can crash the device. The affected products include a wide array of MediaTek chipsets commonly integrated into consumer and enterprise wireless equipment. The impacted firmware versions span CE/NB SDK release 3.6 and earlier, SDK release 7.6.7.2 and earlier, and OpenWrt 19.07 and 21.02 for MT6890. The vulnerability was publicly disclosed in early 2026, with patches identified by MediaTek under internal issue IDs MSV-4852 and patch IDs WCNCR00461663 / WCNCR00463309, although direct patch links are not provided. No active exploitation has been reported yet, but the ease of remote exploitation and the critical role of wireless infrastructure in network availability make this a significant threat. The vulnerability primarily impacts the availability of wireless networking services, potentially disrupting connectivity for users and critical systems relying on affected devices.

Potential Impact

For European organizations, the impact of CVE-2026-20419 can be substantial, especially for those relying on wireless infrastructure built on affected MediaTek chipsets. A successful attack can cause denial of service by rendering wireless access points or stations unresponsive, leading to network outages and loss of connectivity. This can disrupt business operations, especially in sectors dependent on continuous wireless access such as finance, healthcare, manufacturing, and public services. The lack of requirement for user interaction or elevated privileges lowers the barrier for attackers, increasing the risk of opportunistic or targeted attacks. Additionally, the proximity-based remote exploit vector means attackers could operate from nearby physical locations, including public spaces or adjacent offices, complicating perimeter security. The vulnerability could also be leveraged as part of a broader attack chain to degrade network resilience or as a distraction during other malicious activities. Given the widespread use of MediaTek chipsets in consumer and enterprise-grade wireless devices, the scope of affected systems in Europe is significant, potentially impacting both private and public sector networks.

Mitigation Recommendations

European organizations should take proactive steps to mitigate this vulnerability beyond generic advice. First, identify all wireless devices using the affected MediaTek chipsets and firmware versions through asset inventory and network scanning. Coordinate with device vendors and network equipment providers to obtain and apply the official patches referenced by MediaTek (WCNCR00461663 / WCNCR00463309) as soon as they become available. Where immediate patching is not possible, implement network segmentation to isolate vulnerable wireless devices from critical infrastructure and sensitive data. Employ wireless intrusion detection and prevention systems (WIDS/WIPS) to monitor for anomalous wireless traffic patterns indicative of exploitation attempts. Restrict physical access to wireless access points and limit the wireless signal range where feasible to reduce attacker proximity. Regularly update and audit wireless device firmware and configurations to ensure compliance with security best practices. Additionally, consider deploying redundant wireless infrastructure to maintain availability in case of device failure. Finally, raise awareness among network administrators about this vulnerability and the importance of rapid response to firmware updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.009Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806094f9fa50a62f0b3fd4

Added to database: 2/2/2026, 8:30:12 AM

Last enriched: 2/2/2026, 8:45:24 AM

Last updated: 2/6/2026, 4:04:16 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats