cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-20137,https://securityvulnerability.io/vulnerability/CVE-2024-20137,Possible Client Disconnection due to Improper Handling of Exceptional Conditions,"In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727.",MediaTek,"Mt6890, Mt7622, Mt7915, Mt7916, Mt7981, Mt7986",,,0.0004299999854993075,false,false,false,false,,false,false,2024-12-02T03:07:11.803Z,0 CVE-2023-32831,https://securityvulnerability.io/vulnerability/CVE-2023-32831,Vulnerability in WLAN Driver Affecting MediaTek Devices,"A vulnerability has been identified in the WLAN driver of MediaTek products, arising from the use of insufficiently random values that could allow local information disclosure without requiring execution privileges. This issue poses a risk of unauthorized access to sensitive information, as user interaction is not necessary for the exploitation to occur. MediaTek has issued a patch labeled WCNCR00325055 to address this vulnerability, and users are advised to apply this update promptly to enhance their security posture.",MediaTek,"MT6890, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-02T03:15:00.000Z,0 CVE-2023-20820,https://securityvulnerability.io/vulnerability/CVE-2023-20820,Command Injection Vulnerability in MediaTek WLAN Service,"The WLAN service developed by MediaTek is susceptible to a command injection vulnerability caused by inadequate input validation. This security flaw could allow an attacker to execute remote code with system-level privileges, enabling potential unauthorized access and manipulation of the system. Importantly, user interaction is not necessary for an attacker to exploit this vulnerability, increasing the risk of exploitation for affected systems. MediaTek has issued a patch (Patch ID: WCNCR00244189) to address this issue. For detailed information, refer to the product security bulletin from MediaTek.",MediaTek,"Mt6890, Mt7603, Mt7612, Mt7613, Mt7615, Mt7622, Mt7626, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986, Mt7990",7.2,HIGH,0.0013800000306218863,false,false,false,false,,false,false,2023-09-04T03:15:00.000Z,0