Impact
A Modem input validation flaw can trigger a system crash, leading to remote denial of service. The vulnerability does not require any special privileges or user interaction and is classified as a buffer over-read (CWE-125).
Affected Systems
The affected products are MediaTek chipsets, including models mt2735, mt6833, mt6853, mt6855, mt6873, mt6875, mt6877, mt6880, mt6883, mt6885, mt6889, mt6890, mt6891, mt6893, mt8791, and the legacy NR15 operating environment. No specific firmware version is disclosed in the advisory.
Risk and Exploitability
The CVSS score is 6.5, indicating moderate severity, while the EPSS is below 1 %, implying a very low likelihood of exploitation, and the vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. Exploitation can occur when a user equipment device connects to a rogue base station controlled by an attacker. No additional privileges or user interaction are required; the attacker simply induces a modem crash that disables network connectivity for the target device. The likely attack vector is remote, via the radio interface between the device and the compromised base station, and it is inferred from the description that the attack can be conducted over the air without physical access.
OpenCVE Enrichment