cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-20147,https://securityvulnerability.io/vulnerability/CVE-2024-20147,Remote Denial of Service Vulnerability in MediaTek Bluetooth Firmware,"A vulnerability in MediaTek's Bluetooth firmware allows for a reachable assertion due to improper exception handling. This issue can lead to a remote denial of service, where an attacker can exploit the vulnerability without requiring user interaction or additional execution privileges. The affected chipsets, including MT79XX, MT2737, MT3603, MT6XXX, and MT8XXX, may be susceptible unless a patch is applied. The patches are identified with Patch IDs WCNCR00389046 for MT79XX and ALPS09136501 for the other mentioned chipsets. It is crucial for users of these chipsets to implement the recommended patches to mitigate potential risks.",MediaTek,"Mt2737, Mt3603, Mt6835, Mt6878, Mt6886, Mt6897, Mt6985, Mt6989, Mt6990, Mt7902, Mt7920, Mt7921, Mt7922, Mt7925, Mt7927, Mt8195, Mt8370, Mt8390, Mt8395, Mt8518s, Mt8532, Mt8678",5.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-03T03:24:09.635Z,0 CVE-2025-20643,https://securityvulnerability.io/vulnerability/CVE-2025-20643,Out of Bounds Read Vulnerability in MediaTek Devices,"A potential out of bounds read vulnerability exists in certain MediaTek devices due to an insufficient bounds check. If exploited, this vulnerability could allow a malicious actor with physical access to the device to disclose sensitive information, especially if they have already gained System privileges. User interaction is required for the successful exploitation of this issue. For further details and mitigation steps, refer to the security bulletin issued by MediaTek.",MediaTek,"Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6873, Mt6877, Mt6885, Mt6893, Mt8167, Mt8167s, Mt8175, Mt8185, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8893",3.9,LOW,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-03T03:24:08.097Z,0 CVE-2025-20642,https://securityvulnerability.io/vulnerability/CVE-2025-20642,Out of Bounds Write Vulnerability in MediaTek Device,"An out of bounds write vulnerability has been identified in MediaTek devices, stemming from a missing bounds check. This flaw allows an attacker with physical access to potentially escalate privileges locally, posing a risk to device security. It's important to note that user interaction is required for the exploitation of this vulnerability. MediaTek has issued a patch to address this issue, ensuring users can secure their devices against potential threats. Detailed mitigation steps can be found in the security bulletin.",MediaTek,"Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6873, Mt6877, Mt6885, Mt6893, Mt8167, Mt8167s, Mt8175, Mt8185, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8893",6.6,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-02-03T03:24:06.483Z,0 CVE-2025-20641,https://securityvulnerability.io/vulnerability/CVE-2025-20641,Out of Bounds Write Vulnerability in Mediatek Devices,"In certain Mediatek devices, a possible out of bounds write vulnerability has been identified due to a missing bounds check. This issue allows for potential local escalation of privilege if an attacker has physical access, without requiring any additional execution privileges. User interaction is necessary for successful exploitation, making it critical for users to apply patches to ensure their device security. For further details and remediation, consult the official Mediatek product security bulletin.",MediaTek,"Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6873, Mt6877, Mt6885, Mt6893, Mt8167, Mt8167s, Mt8175, Mt8185, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8893",6.6,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-02-03T03:24:04.876Z,0 CVE-2025-20640,https://securityvulnerability.io/vulnerability/CVE-2025-20640,Out of Bounds Read Vulnerability in MediaTek Devices,"An out of bounds read vulnerability exists in MediaTek devices due to a missing bounds check, which can lead to potential local information disclosure. Exploitation of this vulnerability requires physical access to the device and user interaction. Addressing this issue is critical to protecting sensitive data from unauthorized access, and a patch has been released to remediate the flaw.",MediaTek,"Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6873, Mt6877, Mt6885, Mt6893, Mt8167, Mt8167s, Mt8175, Mt8185, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8893",4.3,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-02-03T03:24:03.332Z,0 CVE-2025-20639,https://securityvulnerability.io/vulnerability/CVE-2025-20639,Out of Bounds Write Vulnerability in MediaTek Devices,"A vulnerability in MediaTek's DA software allows for a potential out of bounds write due to insufficient bounds checking. This issue poses a risk of local privilege escalation, requiring an attacker to have physical access to the device for exploitation. User interaction facilitates this attack. To address this issue, MediaTek has issued a patch identified as ALPS09291146, associated with Issue ID MSV-2060.",MediaTek,"Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6873, Mt6877, Mt6885, Mt6893, Mt8167, Mt8167s, Mt8175, Mt8185, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8893",6.6,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-02-03T03:24:01.156Z,0 CVE-2025-20638,https://securityvulnerability.io/vulnerability/CVE-2025-20638,Local Information Disclosure Vulnerability in MediaTek Devices,"A potential local information disclosure vulnerability has been identified in DA by MediaTek, stemming from uninitialized heap data. This flaw allows an attacker with physical access to the device to read sensitive uninitialized data, which could lead to unauthorized access to potentially sensitive information. Notably, user interaction is required to exploit this vulnerability. The issue has been documented with Patch ID: ALPS09291449 and Issue ID: MSV-2066.",MediaTek,"Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6873, Mt6877, Mt6885, Mt6893, Mt8167, Mt8167s, Mt8175, Mt8185, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8893",4.3,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-02-03T03:23:59.474Z,0 CVE-2024-20142,https://securityvulnerability.io/vulnerability/CVE-2024-20142,Out of Bounds Write Vulnerability in V5 DA by MediaTek,"The V5 DA by MediaTek has a vulnerability characterized by an out of bounds write due to a missing bounds check. This flaw presents a risk for local escalation of privileges, provided the attacker has physical access to the device. Exploitation of this vulnerability requires user interaction, making it particularly insidious as it can be leveraged by malicious individuals with direct access. A patch has been released under ID ALPS09291406 to address this security issue, so it is critical for users to update their devices promptly.",MediaTek,"Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6873, Mt6877, Mt6885, Mt6893, Mt8167, Mt8167s, Mt8175, Mt8185, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8893",6.6,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-02-03T03:23:57.752Z,0 CVE-2024-20141,https://securityvulnerability.io/vulnerability/CVE-2024-20141,Out of Bounds Write Vulnerability in V5 DA Affected by MediaTek,"In V5 DA, a vulnerability exists that allows for potential out of bounds writing. This flaw arises from inadequate bounds checking, which presents a risk of local escalation of privilege if an attacker has physical access to the device. Exploitation requires user interaction and does not necessitate any additional execution privileges. It is crucial for users to remain vigilant and apply available patches, such as Patch ID ALPS09291402, to mitigate this security issue.",MediaTek,"Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6873, Mt6877, Mt6885, Mt6893, Mt8167, Mt8167s, Mt8175, Mt8185, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8893",6.6,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-02-03T03:23:56.024Z,0 CVE-2025-20637,https://securityvulnerability.io/vulnerability/CVE-2025-20637,Remote Denial of Service Vulnerability in MediaTek Network Hardware,"A potential vulnerability exists in MediaTek network hardware that could result in an unexpected system hang due to an uncaught exception. This issue allows for a remote denial of service attack to occur without any requirement for user interaction or additional execution privileges. The vulnerability is addressed in patch ID WCNCR00399035, and identified with issue ID MSV-2380.",MediaTek,"Mt7981, Mt7986",7.5,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-02-03T03:23:54.470Z,0 CVE-2025-20636,https://securityvulnerability.io/vulnerability/CVE-2025-20636,Out of Bounds Write Vulnerability in Mediatek Secmem,"A potential vulnerability has been identified in Mediatek's Secmem where an out of bounds write can occur due to a missing bounds check. This flaw could enable a malicious actor, who has already acquired System privileges, to escalate their privileges further. Notably, user interaction is not required for exploitation, posing a significant risk. Immediate attention and patching are recommended to mitigate potential threats. The relevant patch is identified as ALPS09403554 under Issue ID: MSV-2431.",MediaTek,"Mt6580, Mt6739, Mt6761, Mt6765, Mt6768, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6835, Mt6853, Mt6855, Mt6873, Mt6877, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6893, Mt6895, Mt6983, Mt6985, Mt8321, Mt8385, Mt8666, Mt8667, Mt8673, Mt8755, Mt8765, Mt8766, Mt8768, Mt8771, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791t, Mt8795t, Mt8796, Mt8797, Mt8798",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-03T03:23:52.918Z,0 CVE-2025-20635,https://securityvulnerability.io/vulnerability/CVE-2025-20635,Out of Bounds Write Vulnerability in MediaTek V6 DA,"In the MediaTek V6 DA, a vulnerability exists that allows for an out of bounds write due to a lack of appropriate bounds checking. An attacker with physical access to the device can exploit this flaw to escalate privileges locally, requiring no additional execution privileges. The exploitation necessitates user interaction, making it essential for users to remain vigilant regarding device security and updates.",MediaTek,"Mt2737, Mt6781, Mt6789, Mt6835, Mt6855, Mt6878, Mt6879, Mt6880, Mt6886, Mt6890, Mt6895, Mt6897, Mt6980, Mt6983, Mt6985, Mt6989, Mt6990, Mt8370, Mt8390",6.6,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-02-03T03:23:51.354Z,0 CVE-2025-20634,https://securityvulnerability.io/vulnerability/CVE-2025-20634,Out-of-Bounds Write Vulnerability in MediaTek Modem,"A vulnerability in MediaTek's modem allows for an out-of-bounds write due to a missing bounds check. This issue can be exploited when a user equipment (UE) connects to a malicious base station controlled by an attacker, enabling unauthorized remote code execution without requiring any user interaction. To mitigate the risk, it is essential to update to the latest version as specified in patch ID MOLY01289384.",MediaTek,"Mt2737, Mt6813, Mt6835, Mt6835t, Mt6878, Mt6878m, Mt6879, Mt6886, Mt6895, Mt6895tt, Mt6896, Mt6897, Mt6899, Mt6980, Mt6980d, Mt6983, Mt6983t, Mt6985, Mt6985t, Mt6989, Mt6989t, Mt6990, Mt6991, Mt8673, Mt8676, Mt8678, Mt8795t, Mt8798, Mt8863",9.8,CRITICAL,0.000910000002477318,false,,false,false,false,,false,false,false,,2025-02-03T03:23:49.665Z,0 CVE-2025-20631,https://securityvulnerability.io/vulnerability/CVE-2025-20631,Out of Bounds Write Vulnerability in MediaTek WLAN AP Driver,"The WLAN AP driver from MediaTek has a vulnerability that allows an out of bounds write due to an incorrect bounds check. This security flaw can be exploited to escalate privileges locally, requiring no additional execution privileges and no user interaction. Affected systems should be patched promptly to mitigate potential risks. For more information, please refer to the official MediaTek product security bulletin.",MediaTek,"Mt7615, Mt7622, Mt7663, Mt7915, Mt7916, Mt7981, Mt7986",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-03T03:23:48.115Z,0 CVE-2025-20632,https://securityvulnerability.io/vulnerability/CVE-2025-20632,Out of Bounds Write Vulnerability in MediaTek WLAN Driver,"The WLAN driver from MediaTek contains a flaw that allows for an out of bounds write due to improper bounds checking. This vulnerability could enable a local attacker to elevate privileges without requiring additional execution rights. Exploitation does not necessitate user interaction, potentially leaving systems vulnerable to exploitation. The issue requires attention to ensure the integrity of affected products and should be patched promptly.",MediaTek,"Mt7615, Mt7622, Mt7663, Mt7915, Mt7916, Mt7981, Mt7986",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-03T03:23:46.525Z,0 CVE-2025-20633,https://securityvulnerability.io/vulnerability/CVE-2025-20633,Out of Bounds Write Vulnerability in MediaTek WLAN AP Driver,"The MediaTek WLAN AP driver suffers from a vulnerability that permits an out of bounds write due to improper bounds checking. This flaw can enable remote code execution without the need for additional execution privileges. Exploitation of this vulnerability does not require any user interaction, making it particularly concerning for users relying on affected products.",MediaTek,"Mt7603, Mt7615, Mt7622, Mt7915",8.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,false,,2025-02-03T03:23:44.854Z,0 CVE-2024-20153,https://securityvulnerability.io/vulnerability/CVE-2024-20153,"Vulnerability in wlan STA, affecting MediaTek products","A vulnerability has been identified in wlan STA, allowing attackers to deceive clients into connecting to a rogue access point (AP) with a spoofed SSID. This manipulation can result in remote information disclosure without requiring any execution privileges or user interaction, making it particularly concerning for users of various MediaTek wireless products. Patches have been issued under IDs ALPS08990446 and ALPS09057442 to mitigate this issue.",MediaTek,"Mt2737, Mt6989, Mt6991, Mt7925, Mt8365, Mt8518s, Mt8532, Mt8666, Mt8667, Mt8673, Mt8676, Mt8678, Mt8755, Mt8766, Mt8768, Mt8775, Mt8781, Mt8786, Mt8788, Mt8796, Mt8798, Mt8893",7.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:18:01.542Z,0 CVE-2024-20152,https://securityvulnerability.io/vulnerability/CVE-2024-20152,Local Denial of Service in MediaTek wlan STA Driver,"A vulnerability exists in the wlan STA driver from MediaTek, characterized by improper exception handling leading to a reachable assertion. If exploited by a malicious actor with system privileges, this flaw can result in local denial of service. Crucially, user interaction is not needed for exploitation, making it a significant concern for impacted systems. Vendors are advised to apply the relevant patches (Patch ID: WCNCR00389047 / ALPS09136505) to mitigate risk.",MediaTek,"Mt2737, Mt3603, Mt6835, Mt6878, Mt6886, Mt6897, Mt6990, Mt7902, Mt7920, Mt7922, Mt8518s, Mt8532, Mt8755, Mt8766, Mt8768, Mt8775, Mt8781, Mt8796, Mt8798, Mt8893",4.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:59.918Z,0 CVE-2024-20151,https://securityvulnerability.io/vulnerability/CVE-2024-20151,Out of Bounds Write Vulnerability in Mediatek Modem,"A potential local privilege escalation vulnerability has been identified in Mediatek's Modem resulting from an out of bounds write due to improper bounds checking. This flaw allows an attacker, having already gained system privileges, to exploit the vulnerability without requiring user interaction. Prompt remediation is advised to safeguard against potential exploitation. For more details, refer to the official Mediatek product security bulletin.",MediaTek,"Mt2737, Mt2739, Mt6789, Mt6813, Mt6815, Mt6835, Mt6835t, Mt6855, Mt6878, Mt6878t, Mt6879, Mt6886, Mt6895, Mt6895t, Mt6896, Mt6897, Mt6899, Mt6980, Mt6980d, Mt6983, Mt6985, Mt6986, Mt6986d, Mt6988, Mt6989, Mt6990, Mt6991, Mt8676, Mt8678, Mt8798, Mt8863",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:58.239Z,0 CVE-2024-20150,https://securityvulnerability.io/vulnerability/CVE-2024-20150,Logic Error Vulnerability in Modem Affects MediaTek Products,"A logic error in MediaTek's modem can result in potential system crashes, allowing for a remote denial of service without requiring additional execution privileges or user interaction. This vulnerability poses a threat as it can be exploited remotely, impacting the stability of affected systems. Users and organizations relying on MediaTek technology should be aware of this issue and seek necessary patches to ensure their devices remain secure.",MediaTek,"Mt2735, Mt2737, Mt6767, Mt6768, Mt6769, Mt6769k, Mt6769s, Mt6769t, Mt6769z, Mt6779, Mt6781, Mt6783, Mt6785, Mt6785t, Mt6785u, Mt6789, Mt6833p, Mt6835, Mt6835t, Mt6853, Mt6853t, Mt6855, Mt6855t, Mt6873, Mt6875, Mt6875t, Mt6877, Mt6877t, Mt6877tt, Mt6878, Mt6878m, Mt6879, Mt6880, Mt6880t, Mt6880u, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6895tt, Mt6896, Mt6897, Mt6899, Mt6980, Mt6980d, Mt6983t, Mt6985, Mt6985t, Mt6989, Mt6989t, Mt6990, Mt6991, Mt8666, Mt8673, Mt8675, Mt8676, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8781, Mt8786, Mt8788, Mt8788e, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8863",7.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:56.513Z,0 CVE-2024-20149,https://securityvulnerability.io/vulnerability/CVE-2024-20149,Input Validation Flaw in Modem Software from MediaTek,"An input validation flaw in MediaTek's Modem software allows for the potential occurrence of a system crash. This vulnerability can be exploited remotely, resulting in a denial of service without requiring any privileges or user interaction. The issue has been identified in the modem software with specific patch IDs including MOLY01231341, MOLY01263331, and MOLY01233835, highlighting the importance of timely updates to mitigate risks.",MediaTek,"Mt2735, Mt2737, Mt6767, Mt6768, Mt6769, Mt6769k, Mt6769s, Mt6769t, Mt6769z, Mt6779, Mt6781, Mt6783, Mt6785, Mt6785t, Mt6785u, Mt6789, Mt6833p, Mt6835, Mt6835t, Mt6853, Mt6853t, Mt6855, Mt6855t, Mt6873, Mt6875, Mt6875t, Mt6877, Mt6877t, Mt6877tt, Mt6878, Mt6878m, Mt6879, Mt6880, Mt6880t, Mt6880u, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6895tt, Mt6896, Mt6897, Mt6899, Mt6980, Mt6980d, Mt6983t, Mt6985, Mt6985t, Mt6989, Mt6989t, Mt6990, Mt6991, Mt8666, Mt8673, Mt8675, Mt8676, Mt8678, Mt8765, Mt8766, Mt8768, Mt8771, Mt8781, Mt8786, Mt8788, Mt8788e, Mt8789, Mt8791t, Mt8795t, Mt8797, Mt8798, Mt8863",7.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:54.848Z,0 CVE-2024-20105,https://securityvulnerability.io/vulnerability/CVE-2024-20105,Out of Bounds Write Vulnerability in m4u by MediaTek,"The vulnerability in m4u presented by MediaTek arises from an out of bounds write caused by a lack of appropriate bounds checking. This security flaw poses significant risks as it allows a malicious actor, who has already gained system privileges, to exploit the vulnerability without the need for user interaction. This type of attack may lead to local escalation of privileges, potentially compromising the integrity and security of the affected systems. MediaTek has acknowledged the issue and encourages users to apply the necessary patches to safeguard against these risks.",MediaTek,"Mt6580, Mt6739, Mt6761, Mt6765, Mt6768, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6855, Mt6873, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6893, Mt6895, Mt6983, Mt8666, Mt8667, Mt8673, Mt8768",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:53.258Z,0 CVE-2024-20148,https://securityvulnerability.io/vulnerability/CVE-2024-20148,Out of Bounds Write Vulnerability in Mediatek WLAN STA Firmware,"A vulnerability in Mediatek's WLAN STA firmware allows for a possible out of bounds write due to improper input validation. This flaw enables remote code execution without requiring any user interaction or additional privileges. Implementing the latest patches (Patch ID: WCNCR00389045 / ALPS09136494) is essential to safeguard affected systems from exploitation. For more information, visit the Mediatek product security bulletin.",MediaTek,"Mt3603, Mt6835, Mt6878, Mt6886, Mt6897, Mt7902, Mt7920, Mt7922, Mt8518s, Mt8532, Mt8766, Mt8768, Mt8775, Mt8796, Mt8798",9.8,CRITICAL,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:51.547Z,0 CVE-2024-20146,https://securityvulnerability.io/vulnerability/CVE-2024-20146,Out of Bounds Write Vulnerability in Mediatek WLAN Driver,"A vulnerability has been identified in the Mediatek WLAN STA driver, allowing for a potential out of bounds write due to improper input validation. This flaw could enable attackers to execute arbitrary code remotely, without requiring any additional execution privileges or user interactions. If exploited, this could severely compromise the security of affected systems. Immediate action is recommended to mitigate the risks associated with this type of vulnerability.",MediaTek,"Mt2737, Mt3603, Mt6835, Mt6878, Mt6886, Mt6897, Mt6990, Mt7902, Mt7920, Mt7922, Mt8365, Mt8518s, Mt8532, Mt8666, Mt8667, Mt8673, Mt8755, Mt8766, Mt8768, Mt8775, Mt8781, Mt8786, Mt8788, Mt8796, Mt8798, Mt8893",8.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:49.872Z,0 CVE-2024-20145,https://securityvulnerability.io/vulnerability/CVE-2024-20145,Out of Bounds Write Vulnerability in MediaTek V6 DA Products,"A potential out of bounds write vulnerability exists in MediaTek's V6 DA due to an inadequate bounds check. This flaw may allow a local attacker who has physical access to the device to escalate privileges without needing any additional execution permissions. Successful exploitation requires user interaction, making it essential for users to be vigilant about device security. For mitigation, it is recommended to apply the available patches and updates. For more details, refer to the official security bulletin.",MediaTek,"Mt2737, Mt6781, Mt6789, Mt6835, Mt6855, Mt6878, Mt6879, Mt6880, Mt6886, Mt6890, Mt6895, Mt6897, Mt6980, Mt6983, Mt6985, Mt6989, Mt6990, Mt8676",6.6,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-06T03:17:48.166Z,0