In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303.
History

Wed, 02 Jul 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Mediatek
Mediatek mt6890
Mediatek mt6990
Mediatek mt7915
Mediatek mt7915 Firmware
Mediatek mt7916
Mediatek mt7916 Firmware
Mediatek mt7981
Mediatek mt7981 Firmware
Mediatek mt7986
Mediatek mt7986 Firmware
Mediatek mt7990
Mediatek mt7990 Firmware
Mediatek mt7992
Mediatek mt7992 Firmware
Mediatek mt7993
Mediatek mt7993 Firmware
Openwrt
Openwrt openwrt
CPEs cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7990:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7992:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7993:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:mt7915_firmware:7.6.7.2:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:mt7916_firmware:7.6.7.2:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:mt7981_firmware:7.6.7.2:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:mt7986_firmware:7.6.7.2:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:mt7990_firmware:7.6.7.2:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:mt7992_firmware:7.6.7.2:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:mt7993_firmware:7.6.7.2:*:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*
Vendors & Products Mediatek
Mediatek mt6890
Mediatek mt6990
Mediatek mt7915
Mediatek mt7915 Firmware
Mediatek mt7916
Mediatek mt7916 Firmware
Mediatek mt7981
Mediatek mt7981 Firmware
Mediatek mt7986
Mediatek mt7986 Firmware
Mediatek mt7990
Mediatek mt7990 Firmware
Mediatek mt7992
Mediatek mt7992 Firmware
Mediatek mt7993
Mediatek mt7993 Firmware
Openwrt
Openwrt openwrt

Mon, 02 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Jun 2025 16:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 02 Jun 2025 03:15:00 +0000

Type Values Removed Values Added
Description In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303.
Weaknesses CWE-863
References

cve-icon MITRE

Status: PUBLISHED

Assigner: MediaTek

Published:

Updated: 2025-06-03T03:55:10.358Z

Reserved: 2024-11-01T01:21:50.371Z

Link: CVE-2025-20674

cve-icon Vulnrichment

Updated: 2025-06-02T15:15:19.257Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-02T03:15:24.737

Modified: 2025-07-02T15:39:35.530

Link: CVE-2025-20674

cve-icon Redhat

No data.