Impact
The Modem firmware for MediaTek chipsets contains a missing bounds check that allows an out‑of‑bounds write. This flaw can corrupt memory locations and, if triggered, grants elevated privileges to an entity that controls a rogue base station. Remote exploitation requires a user equipment (UE) to connect to a malicious cell tower; no additional execution privileges are needed, though user interaction with the network is required.
Affected Systems
The vulnerability affects all MediaTek chipset devices whose modem firmware has not been updated with the vendor‑issued patch (Patch ID: MOLY01406170). Any firmware releases issued before the April 2026 security bulletin are potentially impacted.
Risk and Exploitability
The CVSS score of 8 indicates a high severity, while the EPSS score of less than 1 % suggests a low current probability of exploitation. Exploitation is only possible when the target device establishes a connection with an attacker‑controlled base station, making the attack path dependent on the deployment of a rogue tower and the device’s network choice. No exploitation evidence is present in the CVE data, but the combination of remote attack capability and privilege escalation warrants careful assessment.
OpenCVE Enrichment