Impact
In the IMS component of certain Unisoc devices, an improper input validation flaw can cause the system to crash. The crash results in a denial of service that can be triggered remotely without needing elevated privileges, effectively knocking the device offline for users. The vulnerability presents a strong reliability risk as it can be repeatedly exercised by attackers who can control network traffic to the IMS interface.
Affected Systems
The flaw affects Unisoc (Shanghai) Technologies devices, specifically the SC7731E, SC9832E, SC9863A, T310, T610, T618, T7200, T7225, T7250, T7255, T7280, T7300, T8100, T9100, T8200, and T8300 models. No specific firmware or release version information is provided, so all current deployments of these models should be considered potentially vulnerable.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity impact. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, the attack vector is likely remote via the IMS interface; this inference is drawn from the mention of remote denial of service. An attacker only needs to send crafted input data to the IMS service; no exploitation of privileged execution paths is required.
OpenCVE Enrichment