cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-32831,https://securityvulnerability.io/vulnerability/CVE-2023-32831,Vulnerability in WLAN Driver Affecting MediaTek Devices,"A vulnerability has been identified in the WLAN driver of MediaTek products, arising from the use of insufficiently random values that could allow local information disclosure without requiring execution privileges. This issue poses a risk of unauthorized access to sensitive information, as user interaction is not necessary for the exploitation to occur. MediaTek has issued a patch labeled WCNCR00325055 to address this vulnerability, and users are advised to apply this update promptly to enhance their security posture.",MediaTek,"MT6890, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-02T03:15:00.000Z,0 CVE-2023-20820,https://securityvulnerability.io/vulnerability/CVE-2023-20820,Command Injection Vulnerability in MediaTek WLAN Service,"The WLAN service developed by MediaTek is susceptible to a command injection vulnerability caused by inadequate input validation. This security flaw could allow an attacker to execute remote code with system-level privileges, enabling potential unauthorized access and manipulation of the system. Importantly, user interaction is not necessary for an attacker to exploit this vulnerability, increasing the risk of exploitation for affected systems. MediaTek has issued a patch (Patch ID: WCNCR00244189) to address this issue. For detailed information, refer to the product security bulletin from MediaTek.",MediaTek,"Mt6890, Mt7603, Mt7612, Mt7613, Mt7615, Mt7622, Mt7626, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986, Mt7990",7.2,HIGH,0.0013800000306218863,false,false,false,false,,false,false,2023-09-04T03:15:00.000Z,0