Impact
Improper input validation within the modem component can cause a system crash when it receives malformed data. The flaw triggers a denial‑of‑service condition that can be activated remotely without user interaction or any privilege escalation. The weakness aligns with CWE‑787, indicating a buffer misuse that allows injected input to corrupt memory and crash the stage managing the radio interface.
Affected Systems
MediaTek chipsets such as MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791t, MT8797 and the NR15 series are impacted. Devices that use any of these hardware blocks are vulnerable until a firmware update that incorporates the fix is applied.
Risk and Exploitability
The CVSS score of 6.5 reflects moderate severity, while an EPSS score of less than 1% indicates a very low probability of exploitation at present. The vulnerability does not appear in the CISA Known Exploited Vulnerabilities list. The attack can be carried out by an adversary controlling a rogue base station that delivers malformed data to the modem; no additional credentials or user action are required.
OpenCVE Enrichment