cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-20137,https://securityvulnerability.io/vulnerability/CVE-2024-20137,Possible Client Disconnection due to Improper Handling of Exceptional Conditions,"In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727.",MediaTek,"Mt6890, Mt7622, Mt7915, Mt7916, Mt7981, Mt7986",,,0.0004299999854993075,false,false,false,false,,false,false,2024-12-02T03:07:11.803Z,0 CVE-2024-20040,https://securityvulnerability.io/vulnerability/CVE-2024-20040,Possible Out-of-Bounds Write in WLAN Firmware Could Lead to Remote Escalation of Privilege,"In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08360153 (for MT6XXX chipsets) / WCNCR00363530 (for MT79XX chipsets); Issue ID: MSV-979.",MediaTek,"Mt2713, Mt6580, Mt6761, Mt6762, Mt6768, Mt6781, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6983, Mt6985, Mt6989, Mt6990, Mt7902, Mt7915, Mt7916, Mt7920, Mt7921, Mt7922, Mt7925, Mt7927, Mt7981, Mt7986, Mt8188, Mt8195, Mt8370, Mt8390, Mt8395, Mt8518s, Mt8532, Mt8673, Mt8678, Mt8781, Mt8791t, Mt8792, Mt8796, Mt8797, Mt8798",,,0.0004299999854993075,false,false,false,false,,false,false,2024-04-01T03:15:00.000Z,0 CVE-2024-20017,https://securityvulnerability.io/vulnerability/CVE-2024-20017,Possible Out of Bounds Write Vulnerability in WLAN Service Could Lead to Local Escalation of Privilege,"An out of bounds write vulnerability exists within the WLAN services of MediaTek products due to improper input validation. This flaw allows for remote code execution without requiring any additional execution privileges, posing a significant security risk. Exploitation of this vulnerability can occur without user interaction, making it critical for users of affected MediaTek devices to implement available patches promptly to mitigate potential threats.",MediaTek,"Mt6890, Mt7915, Mt7916, Mt7981, Mt7986",,,0.0004299999854993075,false,true,false,true,true,true,false,2024-03-04T02:43:22.997Z,4713 CVE-2023-32831,https://securityvulnerability.io/vulnerability/CVE-2023-32831,Vulnerability in WLAN Driver Affecting MediaTek Devices,"A vulnerability has been identified in the WLAN driver of MediaTek products, arising from the use of insufficiently random values that could allow local information disclosure without requiring execution privileges. This issue poses a risk of unauthorized access to sensitive information, as user interaction is not necessary for the exploitation to occur. MediaTek has issued a patch labeled WCNCR00325055 to address this vulnerability, and users are advised to apply this update promptly to enhance their security posture.",MediaTek,"MT6890, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-02T03:15:00.000Z,0 CVE-2023-20820,https://securityvulnerability.io/vulnerability/CVE-2023-20820,Command Injection Vulnerability in MediaTek WLAN Service,"The WLAN service developed by MediaTek is susceptible to a command injection vulnerability caused by inadequate input validation. This security flaw could allow an attacker to execute remote code with system-level privileges, enabling potential unauthorized access and manipulation of the system. Importantly, user interaction is not necessary for an attacker to exploit this vulnerability, increasing the risk of exploitation for affected systems. MediaTek has issued a patch (Patch ID: WCNCR00244189) to address this issue. For detailed information, refer to the product security bulletin from MediaTek.",MediaTek,"Mt6890, Mt7603, Mt7612, Mt7613, Mt7615, Mt7622, Mt7626, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986, Mt7990",7.2,HIGH,0.0013800000306218863,false,false,false,false,,false,false,2023-09-04T03:15:00.000Z,0