Out of Bounds Write Vulnerability in Mediatek Wlan Service
CVE-2025-20654

9.8CRITICAL

Key Information:

Vendor
MediaTek
Vendor
CVE Published:
7 April 2025

What is CVE-2025-20654?

CVE-2025-20654 is a security vulnerability found in the MediaTek Wlan Service, which is integral to the operation of wireless networking functionalities in devices utilizing MediaTek chipsets. This vulnerability is characterized as an out-of-bounds write, resulting from insufficient checks on boundaries during operations. If exploited, this flaw could allow malicious entities to execute code remotely without requiring any user interaction, potentially leading to unauthorized control over the affected systems. Organizations utilizing this software may face severe security risks, including unauthorized access to sensitive data and disruption of services.

Technical Details

The vulnerability stems from a coding error in the handling of memory boundaries within the wlan service of MediaTek systems. Specifically, the lack of a proper bounds check during certain operations can lead to the possibility of writing data outside of allocated memory regions. This out-of-bounds write can be leveraged by attackers to inject malicious code into the system, facilitating remote code execution. Notably, the exploitation process does not necessitate any action from end users, making it particularly threatening for automated attacks.

Potential Impact of CVE-2025-20654

  1. Remote Code Execution: The primary risk posed by this vulnerability is the potential for attackers to execute arbitrary code on affected devices. This could allow them to gain unauthorized access to sensitive information, alter configurations, or install malicious software.

  2. Compromise of Confidential Data: Given the nature of the exploitation, an attacker could access personal data, system configurations, and proprietary information, resulting in potential data breaches that may have legal and regulatory implications for impacted organizations.

  3. Service Disruption: If an attacker successfully exploits this vulnerability, it may lead to unauthorized control over network functions, possibly resulting in denial of service or a complete compromise of network operations. This disruption can affect productivity and lead to significant financial losses for organizations relying on the affected services.

Affected Version(s)

MT6890, MT7622, MT7915, MT7916, MT7981, MT7986 SDK version 7.4.0.1 and before (for MT7622 and MT7915) / SDK version 7.6.7.0 and before (for MT7916, MT7981 and MT7986) / OpenWrt 19.07, 21.02 (for MT6890)

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.