cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-20637,https://securityvulnerability.io/vulnerability/CVE-2025-20637,Remote Denial of Service Vulnerability in MediaTek Network Hardware,"A potential vulnerability exists in MediaTek network hardware that could result in an unexpected system hang due to an uncaught exception. This issue allows for a remote denial of service attack to occur without any requirement for user interaction or additional execution privileges. The vulnerability is addressed in patch ID WCNCR00399035, and identified with issue ID MSV-2380.",MediaTek,"Mt7981, Mt7986",7.5,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-02-03T03:23:54.470Z,0 CVE-2025-20634,https://securityvulnerability.io/vulnerability/CVE-2025-20634,Out-of-Bounds Write Vulnerability in MediaTek Modem,"A vulnerability in MediaTek's modem allows for an out-of-bounds write due to a missing bounds check. This issue can be exploited when a user equipment (UE) connects to a malicious base station controlled by an attacker, enabling unauthorized remote code execution without requiring any user interaction. To mitigate the risk, it is essential to update to the latest version as specified in patch ID MOLY01289384.",MediaTek,"Mt2737, Mt6813, Mt6835, Mt6835t, Mt6878, Mt6878m, Mt6879, Mt6886, Mt6895, Mt6895tt, Mt6896, Mt6897, Mt6899, Mt6980, Mt6980d, Mt6983, Mt6983t, Mt6985, Mt6985t, Mt6989, Mt6989t, Mt6990, Mt6991, Mt8673, Mt8676, Mt8678, Mt8795t, Mt8798, Mt8863",9.8,CRITICAL,0.000910000002477318,false,,false,false,false,,false,false,false,,2025-02-03T03:23:49.665Z,0 CVE-2025-20631,https://securityvulnerability.io/vulnerability/CVE-2025-20631,Out of Bounds Write Vulnerability in MediaTek WLAN AP Driver,"The WLAN AP driver from MediaTek has a vulnerability that allows an out of bounds write due to an incorrect bounds check. This security flaw can be exploited to escalate privileges locally, requiring no additional execution privileges and no user interaction. Affected systems should be patched promptly to mitigate potential risks. For more information, please refer to the official MediaTek product security bulletin.",MediaTek,"Mt7615, Mt7622, Mt7663, Mt7915, Mt7916, Mt7981, Mt7986",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-03T03:23:48.115Z,0 CVE-2025-20632,https://securityvulnerability.io/vulnerability/CVE-2025-20632,Out of Bounds Write Vulnerability in MediaTek WLAN Driver,"The WLAN driver from MediaTek contains a flaw that allows for an out of bounds write due to improper bounds checking. This vulnerability could enable a local attacker to elevate privileges without requiring additional execution rights. Exploitation does not necessitate user interaction, potentially leaving systems vulnerable to exploitation. The issue requires attention to ensure the integrity of affected products and should be patched promptly.",MediaTek,"Mt7615, Mt7622, Mt7663, Mt7915, Mt7916, Mt7981, Mt7986",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-03T03:23:46.525Z,0 CVE-2025-20633,https://securityvulnerability.io/vulnerability/CVE-2025-20633,Out of Bounds Write Vulnerability in MediaTek WLAN AP Driver,"The MediaTek WLAN AP driver suffers from a vulnerability that permits an out of bounds write due to improper bounds checking. This flaw can enable remote code execution without the need for additional execution privileges. Exploitation of this vulnerability does not require any user interaction, making it particularly concerning for users relying on affected products.",MediaTek,"Mt7603, Mt7615, Mt7622, Mt7915",8.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,false,,2025-02-03T03:23:44.854Z,0 CVE-2024-20153,https://securityvulnerability.io/vulnerability/CVE-2024-20153,"Vulnerability in wlan STA, affecting MediaTek products","A vulnerability has been identified in wlan STA, allowing attackers to deceive clients into connecting to a rogue access point (AP) with a spoofed SSID. This manipulation can result in remote information disclosure without requiring any execution privileges or user interaction, making it particularly concerning for users of various MediaTek wireless products. Patches have been issued under IDs ALPS08990446 and ALPS09057442 to mitigate this issue.",MediaTek,"Mt2737, Mt6989, Mt6991, Mt7925, Mt8365, Mt8518s, Mt8532, Mt8666, Mt8667, Mt8673, Mt8676, Mt8678, Mt8755, Mt8766, Mt8768, Mt8775, Mt8781, Mt8786, Mt8788, Mt8796, Mt8798, Mt8893",7.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:18:01.542Z,0 CVE-2024-20150,https://securityvulnerability.io/vulnerability/CVE-2024-20150,Logic Error Vulnerability in Modem Affects MediaTek Products,"A logic error in MediaTek's modem can result in potential system crashes, allowing for a remote denial of service without requiring additional execution privileges or user interaction. This vulnerability poses a threat as it can be exploited remotely, impacting the stability of affected systems. Users and organizations relying on MediaTek technology should be aware of this issue and seek necessary patches to ensure their devices remain secure.",MediaTek,"Mt2735, Mt2737, Mt6767, Mt6768, Mt6769, Mt6769k, Mt6769s, Mt6769t, Mt6769z, Mt6779, Mt6781, Mt6783, Mt6785, Mt6785t, Mt6785u, Mt6789, Mt6833p, Mt6835, Mt6835t, Mt6853, Mt6853t, Mt6855, Mt6855t, Mt6873, Mt6875, Mt6875t, Mt6877, Mt6877t, Mt6877tt, Mt6878, Mt6878m, Mt6879, Mt6880, Mt6880t, Mt6880u, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6895tt, Mt6896, Mt6897, Mt6899, Mt6980, Mt6980d, Mt6983t, Mt6985, Mt6985t, Mt6989, Mt6989t, Mt6990, Mt6991, Mt8666, Mt8673, Mt8675, Mt8676, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8781, Mt8786, Mt8788, Mt8788e, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8863",7.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:56.513Z,0 CVE-2024-20149,https://securityvulnerability.io/vulnerability/CVE-2024-20149,Input Validation Flaw in Modem Software from MediaTek,"An input validation flaw in MediaTek's Modem software allows for the potential occurrence of a system crash. This vulnerability can be exploited remotely, resulting in a denial of service without requiring any privileges or user interaction. The issue has been identified in the modem software with specific patch IDs including MOLY01231341, MOLY01263331, and MOLY01233835, highlighting the importance of timely updates to mitigate risks.",MediaTek,"Mt2735, Mt2737, Mt6767, Mt6768, Mt6769, Mt6769k, Mt6769s, Mt6769t, Mt6769z, Mt6779, Mt6781, Mt6783, Mt6785, Mt6785t, Mt6785u, Mt6789, Mt6833p, Mt6835, Mt6835t, Mt6853, Mt6853t, Mt6855, Mt6855t, Mt6873, Mt6875, Mt6875t, Mt6877, Mt6877t, Mt6877tt, Mt6878, Mt6878m, Mt6879, Mt6880, Mt6880t, Mt6880u, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6895tt, Mt6896, Mt6897, Mt6899, Mt6980, Mt6980d, Mt6983t, Mt6985, Mt6985t, Mt6989, Mt6989t, Mt6990, Mt6991, Mt8666, Mt8673, Mt8675, Mt8676, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8781, Mt8786, Mt8788, Mt8788e, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8863",7.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:54.848Z,0 CVE-2024-20148,https://securityvulnerability.io/vulnerability/CVE-2024-20148,Out of Bounds Write Vulnerability in Mediatek WLAN STA Firmware,"A vulnerability in Mediatek's WLAN STA firmware allows for a possible out of bounds write due to improper input validation. This flaw enables remote code execution without requiring any user interaction or additional privileges. Implementing the latest patches (Patch ID: WCNCR00389045 / ALPS09136494) is essential to safeguard affected systems from exploitation. For more information, visit the Mediatek product security bulletin.",MediaTek,"Mt3603, Mt6835, Mt6878, Mt6886, Mt6897, Mt7902, Mt7920, Mt7922, Mt8518s, Mt8532, Mt8766, Mt8768, Mt8775, Mt8796, Mt8798",9.8,CRITICAL,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:51.547Z,0 CVE-2024-20146,https://securityvulnerability.io/vulnerability/CVE-2024-20146,Out of Bounds Write Vulnerability in Mediatek WLAN Driver,"A vulnerability has been identified in the Mediatek WLAN STA driver, allowing for a potential out of bounds write due to improper input validation. This flaw could enable attackers to execute arbitrary code remotely, without requiring any additional execution privileges or user interactions. If exploited, this could severely compromise the security of affected systems. Immediate action is recommended to mitigate the risks associated with this type of vulnerability.",MediaTek,"Mt2737, Mt3603, Mt6835, Mt6878, Mt6886, Mt6897, Mt6990, Mt7902, Mt7920, Mt7922, Mt8365, Mt8518s, Mt8532, Mt8666, Mt8667, Mt8673, Mt8755, Mt8766, Mt8768, Mt8775, Mt8781, Mt8786, Mt8788, Mt8796, Mt8798, Mt8893",8.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:49.872Z,0 CVE-2024-20154,https://securityvulnerability.io/vulnerability/CVE-2024-20154,Out of Bounds Write Vulnerability in MediaTek Modem,"A vulnerability has been identified in MediaTek Modem due to a missing bounds check, resulting in a possible out of bounds write. This flaw allows for remote code execution if an unwitting user connects to a malicious base station operated by an attacker. No local execution privileges or user interaction are required for exploitation, making this a serious risk for affected products. Users are strongly encouraged to apply the necessary patches provided by the vendor to mitigate this issue.",MediaTek,"Mt2735, Mt6767, Mt6768, Mt6769, Mt6769k, Mt6769s, Mt6769t, Mt6769z, Mt6779, Mt6781, Mt6783, Mt6785, Mt6785t, Mt6785u, Mt6789, Mt6833p, Mt6853, Mt6853t, Mt6855, Mt6855t, Mt6873, Mt6875, Mt6875t, Mt6877, Mt6877t, Mt6877tt, Mt6880, Mt6880t, Mt6880u, Mt6883, Mt6885, Mt6889, Mt6890, Mt6891, Mt6893, Mt8666, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8771, Mt8781, Mt8786, Mt8788, Mt8788e, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798",8.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:41.540Z,386 CVE-2024-20129,https://securityvulnerability.io/vulnerability/CVE-2024-20129,Possible Out-of-Bounds Read Leads to Remote Denial of Service,"This vulnerability in MediaTek's telephony software arises from a missing bounds check, potentially allowing unauthorized remote access that could lead to a denial of service. Notably, exploitation requires no user interaction, highlighting the severity of the issue. Affected users are urged to apply the patch ID ALPS09289881 to mitigate risks associated with this security flaw.",MediaTek,"Mt6580, Mt6739, Mt6761, Mt6765, Mt6768, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6835, Mt6853, Mt6855, Mt6873, Mt6877, Mt6878, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6893, Mt6895, Mt6896, Mt6897, Mt6983, Mt6985, Mt6989, Mt8321, Mt8666, Mt8667, Mt8673, Mt8678, Mt8765, Mt8766, Mt8766r, Mt8768, Mt8771, Mt8781, Mt8786, Mt8788, Mt8788e, Mt8791t, Mt8797, Mt8798, Mt8863t",7.5,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-12-02T03:06:55.338Z,0 CVE-2024-20089,https://securityvulnerability.io/vulnerability/CVE-2024-20089,Possible Denial of Service Vulnerability in WLAN,"A vulnerability has been identified in Mediatek's WLAN products that could result in a remote denial of service due to improper error handling within the wlan module. An attacker could exploit this flaw without needing any additional execution privileges or user interaction. This could allow for disruption of service, impacting users reliant on these WLAN products. A patch addressing this issue has been released under Patch ID ALPS08861558.",MediaTek,"Mt6835, Mt6878, Mt6886, Mt6897, Mt6980, Mt6985, Mt6989, Mt6990, Mt8678, Mt8775, Mt8792, Mt8796",7.5,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-09-02T02:07:37.971Z,0 CVE-2024-20066,https://securityvulnerability.io/vulnerability/CVE-2024-20066,Possible Out of Bounds Write in Modern Modem Could Lead to Remote Denial of Service,"An out of bounds write vulnerability exists in certain MediaTek modems due to inadequate bounds checking. This flaw may allow attackers to cause a remote denial of service without needing any execution privileges or user interaction for exploitation. Affected models are at risk, and it is essential to apply the recommended patches to ensure system integrity and security.",MediaTek,"Mt6298, Mt6813, Mt6815, Mt6835, Mt6878, Mt6879, Mt6895, Mt6895t, Mt6896, Mt6897, Mt6899, Mt6980, Mt6980d, Mt6983, Mt6986, Mt6986d, Mt6990, Mt6991, Mt8673, Mt8792, Mt8798",7.5,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-06-03T02:04:43.910Z,0 CVE-2024-20064,https://securityvulnerability.io/vulnerability/CVE-2024-20064,Possible Out of Bounds Write Vulnerability in WLAN Service Could Lead to Local Escalation of Privilege,"The WLAN service provided by MediaTek is subject to a vulnerability due to improper input validation, allowing an out of bounds write. This flaw could enable an attacker to escalate privileges locally without requiring additional execution privileges or user interaction. The issue has been tracked under Patch ID: ALPS08572601 and Issue ID: MSV-1229. Users are advised to apply the necessary patches to mitigate this security risk.",MediaTek,"Mt6580, Mt6761, Mt6762, Mt6768, Mt6781, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, Mt6985, Mt6989, Mt8678, Mt8755, Mt8775, Mt8792, Mt8796",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-06T02:51:58.538Z,0 CVE-2024-20004,https://securityvulnerability.io/vulnerability/CVE-2024-20004,Possible System Crash Due to Improper Input Validation,"The vulnerability in MediaTek's Modem NL1 arises from improper input validation, which could allow an attacker to cause a system crash. This vulnerability is exploited by sending an invalid NR RRC Connection Setup message, resulting in a remote denial of service. No additional privileges or user interaction are required for this exploitation, making it particularly concerning for users of the Modem NL1. Affected users can reference the provided patch ID MOLY01191612 to mitigate the issue.",MediaTek,"Mt2735, Mt6297, Mt6833, Mt6853, Mt6855, Mt6873, Mt6875, Mt6875t, Mt6877, Mt6880, Mt6883, Mt6885, Mt6889, Mt6890, Mt6891, Mt6893, Mt8675, Mt8791, Mt8791t, Mt8797",7.5,HIGH,0.0007699999841861427,false,,false,false,false,,,false,false,,2024-02-05T05:59:44.132Z,0 CVE-2024-20015,https://securityvulnerability.io/vulnerability/CVE-2024-20015,Possible Escalation of Privilege via Permissions Bypass,"A vulnerability exists within MediaTek's telephony products that facilitates a local escalation of privilege due to a permissions bypass. This flaw allows attackers to gain higher privileges on the system without the necessity for additional execution privileges or user interaction. The issue highlights the importance of maintaining stringent security measures in telephony applications, especially in environments where comprehensive access controls are expected. The identified patch for this vulnerability is coded ALPS08441419. For more details on the patch and security guidelines, refer to the official MediaTek product security bulletin.",MediaTek,"MT6739, MT6753, MT6757, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6781, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8321, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-02-05T05:59:38.166Z,0 CVE-2024-20003,https://securityvulnerability.io/vulnerability/CVE-2024-20003,Possible System Crash Due to Improper Input Validation,"A vulnerability identified in MediaTek's Modem NL1 stems from inadequate input validation, which can cause the system to crash. When an invalid NR RRC Connection Setup message is transmitted, it can lead to a remote denial of service without requiring additional execution privileges or user interaction. This presents a significant risk to system integrity and availability, emphasizing the need for immediate attention and patching to prevent exploitation.",MediaTek,"MT2735, MT6297, MT6833, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8791, MT8791T, MT8797",7.5,HIGH,0.0007699999841861427,false,,false,false,false,,,false,false,,2024-02-05T05:59:33.841Z,0 CVE-2024-20011,https://securityvulnerability.io/vulnerability/CVE-2024-20011,Possible Information Disclosure in Alac Decoder Could Lead to Remote Code Execution,"The vulnerability in MediaTek's ALAC decoder is characterized by a potential information disclosure issue stemming from an incorrect bounds check. This flaw permits remote code execution without requiring any additional execution privileges or user interaction, posing a significant risk to affected systems. The vulnerability is associated with the patch ID ALPS08441146, highlighting the importance of timely updates to mitigate the associated risks.",MediaTek,"MT6985, MT8127, MT8135, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8185, MT8188, MT8188T, MT8195, MT8195Z, MT8312C, MT8312D",9.8,CRITICAL,0.0010600000387057662,false,,false,false,false,,,false,false,,2024-02-05T05:59:32.380Z,0 CVE-2024-20009,https://securityvulnerability.io/vulnerability/CVE-2024-20009,Possible Out of Bounds Write in Alac Decoder Could Lead to Remote Escalation of Privilege,"The MediaTek ALAC decoder has a vulnerability characterized by a possible out of bounds write resulting from inadequate error handling mechanisms. This security issue introduces a risk of remote escalation of privilege, allowing attackers to exploit the vulnerability without requiring any additional execution privileges. User interaction is necessary for the successful exploitation of this flaw, highlighting the importance of awareness and vigilance among users. The identified patch for this issue is ALPS08441150, which addresses the associated risks and enhances the security posture of affected products.",MediaTek,"MT6580, MT6739, MT6761, MT6762, MT6765, MT6779, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6895, MT6983, MT6985, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8185, MT8188, MT8188T",8.8,HIGH,0.0010600000387057662,false,,false,false,false,,,false,false,,2024-02-05T05:59:29.526Z,0 CVE-2024-20007,https://securityvulnerability.io/vulnerability/CVE-2024-20007,Possible Out of Bounds Write in MP3 Decoder Could Lead to Remote Escalation of Privilege,"A vulnerability in the MP3 Decoder from MediaTek allows for an out of bounds write due to a race condition. This security flaw requires user interaction for exploitation, which leads to remote escalation of privilege without needing additional execution privileges. Affected users are encouraged to apply the patch ID ALPS08441369 to mitigate risks associated with this issue.",MediaTek,"MT6580, MT6739, MT6761, MT6762, MT6765, MT6779, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6895, MT6983, MT6985, MT8321, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT8798",7.5,HIGH,0.0010600000387057662,false,,false,false,false,,,false,false,,2024-02-05T05:59:28.064Z,0 CVE-2023-32888,https://securityvulnerability.io/vulnerability/CVE-2023-32888,Out of Bounds Write Vulnerability in Mediatek Modem IMS Call UA,"The out of bounds write vulnerability in Mediatek's Modem IMS Call User Agent presents significant security concerns, as it results from a failure to implement proper bounds checking. This oversight enables potential attackers to induce a remote denial of service, disrupting the availability of the affected systems without requiring any user interaction. To mitigate this risk, it is crucial for users to apply the necessary patches and keep their systems updated. The relevant patch ID is MOLY01161830, associated with issue ID MSV-894, emphasizing the importance of addressing this vulnerability promptly.",MediaTek,"MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990",7.5,HIGH,0.0014400000218302011,false,,false,false,false,,,false,false,,2024-01-02T03:15:00.000Z,0 CVE-2023-32887,https://securityvulnerability.io/vulnerability/CVE-2023-32887,Modem IMS Stack Denial of Service Vulnerability in MediaTek Products,"A vulnerability exists in the Modem IMS Stack, where a missing bounds check may result in a potential system crash. This issue enables a remote denial of service attack that does not require any additional execution privileges or user interaction for exploitation. Users of the affected MediaTek products should be aware of this vulnerability to mitigate risks and ensure system integrity. For details on the patch addressing this issue, refer to Patch ID: MOLY01161837.",MediaTek,"MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990",7.5,HIGH,0.0014400000218302011,false,,false,false,false,,,false,false,,2024-01-02T03:15:00.000Z,0 CVE-2023-32890,https://securityvulnerability.io/vulnerability/CVE-2023-32890,Possible System Crash Due to Improper Input Validation,"A flaw exists in the MediaTek modem EMM due to inadequate input validation processes. This vulnerability allows attackers to potentially cause a system crash, resulting in a remote denial of service condition. Critically, the exploitation of this vulnerability does not require any user interaction, making it a significant security concern for users of the affected products. The issue has been documented under Patch ID: MOLY01183647 and pertains to Issue ID: MOLY01183647 (MSV-963).",MediaTek,"MT2731, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT8786",7.5,HIGH,0.00139999995008111,false,,false,false,false,,,false,false,,2024-01-02T03:15:00.000Z,0 CVE-2023-32874,https://securityvulnerability.io/vulnerability/CVE-2023-32874,Out of Bounds Write Vulnerability in MediaTek Modem IMS Stack,"A vulnerability exists within the Modem IMS Stack from MediaTek, characterized by a possible out of bounds write due to a missing bounds check. This flaw permits the potential for remote code execution without the necessity for additional user privileges or interaction, posing significant security risks. It is crucial for users and administrators to apply the patch identified as MOLY01161803 to mitigate this issue.",MediaTek,"MT2735, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990",9.8,CRITICAL,0.0036700000055134296,false,,false,false,false,,,false,false,,2024-01-02T03:15:00.000Z,0