cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-20637,https://securityvulnerability.io/vulnerability/CVE-2025-20637,Remote Denial of Service Vulnerability in MediaTek Network Hardware,"A potential vulnerability exists in MediaTek network hardware that could result in an unexpected system hang due to an uncaught exception. This issue allows for a remote denial of service attack to occur without any requirement for user interaction or additional execution privileges. The vulnerability is addressed in patch ID WCNCR00399035, and identified with issue ID MSV-2380.",MediaTek,"Mt7981, Mt7986",7.5,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-02-03T03:23:54.470Z,0 CVE-2025-20631,https://securityvulnerability.io/vulnerability/CVE-2025-20631,Out of Bounds Write Vulnerability in MediaTek WLAN AP Driver,"The WLAN AP driver from MediaTek has a vulnerability that allows an out of bounds write due to an incorrect bounds check. This security flaw can be exploited to escalate privileges locally, requiring no additional execution privileges and no user interaction. Affected systems should be patched promptly to mitigate potential risks. For more information, please refer to the official MediaTek product security bulletin.",MediaTek,"Mt7615, Mt7622, Mt7663, Mt7915, Mt7916, Mt7981, Mt7986",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-03T03:23:48.115Z,0 CVE-2025-20632,https://securityvulnerability.io/vulnerability/CVE-2025-20632,Out of Bounds Write Vulnerability in MediaTek WLAN Driver,"The WLAN driver from MediaTek contains a flaw that allows for an out of bounds write due to improper bounds checking. This vulnerability could enable a local attacker to elevate privileges without requiring additional execution rights. Exploitation does not necessitate user interaction, potentially leaving systems vulnerable to exploitation. The issue requires attention to ensure the integrity of affected products and should be patched promptly.",MediaTek,"Mt7615, Mt7622, Mt7663, Mt7915, Mt7916, Mt7981, Mt7986",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-03T03:23:46.525Z,0 CVE-2024-20137,https://securityvulnerability.io/vulnerability/CVE-2024-20137,Possible Client Disconnection due to Improper Handling of Exceptional Conditions,"In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727.",MediaTek,"Mt6890, Mt7622, Mt7915, Mt7916, Mt7981, Mt7986",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-12-02T03:07:11.803Z,0 CVE-2024-20040,https://securityvulnerability.io/vulnerability/CVE-2024-20040,Possible Out-of-Bounds Write in WLAN Firmware Could Lead to Remote Escalation of Privilege,"In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08360153 (for MT6XXX chipsets) / WCNCR00363530 (for MT79XX chipsets); Issue ID: MSV-979.",MediaTek,"Mt2713, Mt6580, Mt6761, Mt6762, Mt6768, Mt6781, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6983, Mt6985, Mt6989, Mt6990, Mt7902, Mt7915, Mt7916, Mt7920, Mt7921, Mt7922, Mt7925, Mt7927, Mt7981, Mt7986, Mt8188, Mt8195, Mt8370, Mt8390, Mt8395, Mt8518s, Mt8532, Mt8673, Mt8678, Mt8781, Mt8791t, Mt8792, Mt8796, Mt8797, Mt8798",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-04-01T03:15:00.000Z,0 CVE-2024-20017,https://securityvulnerability.io/vulnerability/CVE-2024-20017,Possible Out of Bounds Write Vulnerability in WLAN Service Could Lead to Local Escalation of Privilege,"An out of bounds write vulnerability exists within the WLAN services of MediaTek products due to improper input validation. This flaw allows for remote code execution without requiring any additional execution privileges, posing a significant security risk. Exploitation of this vulnerability can occur without user interaction, making it critical for users of affected MediaTek devices to implement available patches promptly to mitigate potential threats.",MediaTek,"Mt6890, Mt7915, Mt7916, Mt7981, Mt7986",,,0.0004299999854993075,false,,true,false,true,2024-08-30T14:54:36.000Z,true,true,false,,2024-03-04T02:43:22.997Z,4713 CVE-2023-32831,https://securityvulnerability.io/vulnerability/CVE-2023-32831,Vulnerability in WLAN Driver Affecting MediaTek Devices,"A vulnerability has been identified in the WLAN driver of MediaTek products, arising from the use of insufficiently random values that could allow local information disclosure without requiring execution privileges. This issue poses a risk of unauthorized access to sensitive information, as user interaction is not necessary for the exploitation to occur. MediaTek has issued a patch labeled WCNCR00325055 to address this vulnerability, and users are advised to apply this update promptly to enhance their security posture.",MediaTek,"MT6890, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986",5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-01-02T03:15:00.000Z,0 CVE-2023-20820,https://securityvulnerability.io/vulnerability/CVE-2023-20820,Command Injection Vulnerability in MediaTek WLAN Service,"The WLAN service developed by MediaTek is susceptible to a command injection vulnerability caused by inadequate input validation. This security flaw could allow an attacker to execute remote code with system-level privileges, enabling potential unauthorized access and manipulation of the system. Importantly, user interaction is not necessary for an attacker to exploit this vulnerability, increasing the risk of exploitation for affected systems. MediaTek has issued a patch (Patch ID: WCNCR00244189) to address this issue. For detailed information, refer to the product security bulletin from MediaTek.",MediaTek,"Mt6890, Mt7603, Mt7612, Mt7613, Mt7615, Mt7622, Mt7626, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986, Mt7990",7.2,HIGH,0.0013800000306218863,false,,false,false,false,,,false,false,,2023-09-04T03:15:00.000Z,0 CVE-2022-32666,https://securityvulnerability.io/vulnerability/CVE-2022-32666,Remote Denial of Service in Wi-Fi Products by MediaTek,"A vulnerability in MediaTek Wi-Fi chipsets can lead to a reduction in throughput caused by the misrepresentation of critical information. This deficiency can be exploited remotely without requiring any user interaction, potentially causing a denial of service condition. Affected products should be updated with the latest patches to mitigate this vulnerability. For more information, check the official security bulletin.",MediaTek,"Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986, Mt8365",7.5,HIGH,0.0015899999998509884,false,,false,false,false,,,false,false,,2023-07-04T01:44:59.030Z,0 CVE-2022-32654,https://securityvulnerability.io/vulnerability/CVE-2022-32654,Local Privilege Escalation in MediaTek Wi-Fi Driver,"The MediaTek Wi-Fi driver contains an issue related to improper error handling, which can trigger undefined behavior. This vulnerability opens the door for a local attacker to gain elevated privileges on the system, without requiring any user interaction. The flaw highlights the importance of robust error management in driver development to mitigate potential exploitation risks.",MediaTek,"Mt5221, Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7663, Mt7668, Mt7682, Mt7686, Mt7687, Mt7697, Mt7902, Mt7915, Mt7916, Mt7921, Mt7933, Mt7981, Mt7986, Mt8167s, Mt8175, Mt8362a, Mt8365, Mt8385, Mt8518s, Mt8532, Mt8695, Mt8696, Mt8788",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-02-06T00:00:00.000Z,0 CVE-2022-32663,https://securityvulnerability.io/vulnerability/CVE-2022-32663,Wi-Fi Driver Vulnerability in MediaTek Products,"A vulnerability exists within the Wi-Fi driver of MediaTek products, which may cause a system crash due to a null pointer dereference. Exploiting this flaw can lead to a remote denial of service, allowing attackers to disrupt the system without requiring any additional execution privileges. Importantly, user interaction is not necessary for this vulnerability to be exploited, making it a significant concern for the affected environments. Ensure your systems are updated with the latest patches to mitigate this risk.",MediaTek,"Mt5221, Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7668, Mt7902, Mt7915, Mt7916, Mt7921, Mt7981, Mt7986, Mt8167s, Mt8175, Mt8362a, Mt8365, Mt8385, Mt8518s, Mt8532, Mt8788",7.5,HIGH,0.0015399999683722854,false,,false,false,false,,,false,false,,2023-02-06T00:00:00.000Z,0 CVE-2022-32655,https://securityvulnerability.io/vulnerability/CVE-2022-32655,Undefined Behavior in Wi-Fi Driver Affects MediaTek Products,"A vulnerability exists in the Wi-Fi driver from MediaTek due to improper error handling, leading to potential undefined behavior. This flaw could allow an attacker to escalate privileges to a system execution level without requiring user interaction. Users of affected MediaTek products should be aware of this vulnerability and apply the necessary patches provided by the vendor.",MediaTek,"Mt5221, Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7663, Mt7668, Mt7682, Mt7686, Mt7687, Mt7697, Mt7902, Mt7915, Mt7916, Mt7921, Mt7933, Mt7981, Mt7986, Mt8167s, Mt8175, Mt8362a, Mt8365, Mt8385, Mt8518s, Mt8532, Mt8695, Mt8696, Mt8788",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-02-06T00:00:00.000Z,0 CVE-2022-32656,https://securityvulnerability.io/vulnerability/CVE-2022-32656,Privilege Escalation in Mediatek Wi-Fi Driver,"The Mediatek Wi-Fi driver contains a flaw due to inadequate error handling, which may result in undefined behavior. This vulnerability can potentially allow an attacker with local access to escalate privileges to system execution level without the need for user interaction. Affected systems should be updated promptly following the patch indicated by Issue ID GN20220705035 to mitigate the risks associated with this vulnerability.",MediaTek,"Mt5221, Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7663, Mt7668, Mt7682, Mt7686, Mt7687, Mt7697, Mt7902, Mt7915, Mt7916, Mt7921, Mt7933, Mt7981, Mt7986, Mt8167s, Mt8175, Mt8362a, Mt8365, Mt8385, Mt8518s, Mt8532, Mt8695, Mt8696, Mt8788",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-02-06T00:00:00.000Z,0 CVE-2022-32657,https://securityvulnerability.io/vulnerability/CVE-2022-32657,Undefined Behavior in Wi-Fi Driver by MediaTek Leading to Local Escalation of Privilege,"A vulnerability in the Wi-Fi driver of MediaTek products arises from improper error handling, resulting in potential undefined behavior. This may permit local escalation of privileges, allowing an attacker to execute actions with elevated system rights without any user interaction. The issue highlights the importance of robust error management in driver software to mitigate risks associated with unauthorized access.",MediaTek,"Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-01-03T00:00:00.000Z,0 CVE-2022-32659,https://securityvulnerability.io/vulnerability/CVE-2022-32659,Privilege Escalation Vulnerability in MediaTek Wi-Fi Driver,"A vulnerability exists in MediaTek's Wi-Fi driver that may lead to undefined behavior due to improper error handling. This flaw can allow an attacker to escalate local privileges, enabling them to execute system-level commands without needing user interaction. Affected systems should apply the provided patch (GN20220705066) to mitigate this issue and secure their environment.",MediaTek,"Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986, Mt8518s, Mt8532",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-01-03T00:00:00.000Z,0 CVE-2022-32658,https://securityvulnerability.io/vulnerability/CVE-2022-32658,Undefined Behavior Vulnerability in Mediatek Wi-Fi Driver,"A vulnerability has been identified in the Mediatek Wi-Fi driver where improper error handling leads to undefined behavior. This flaw enables a local attacker to escalate privileges to system execution levels. The exploitation of this vulnerability does not require user interaction, making it a critical concern for affected systems. A patch has been released addressing this issue, designated under patch ID GN20220705059.",MediaTek,"Mt7603, Mt7613, Mt7615, Mt7622, Mt7628, Mt7629, Mt7915, Mt7916, Mt7981, Mt7986",6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-01-03T00:00:00.000Z,0