Impact
The vulnerability originates from a missing bounds check in the device’s display subsystem, leading to an out‑of‑bounds write (CWE‑787). An attacker who already has system privileges can exploit this memory corruption to elevate privileges further or potentially tamper with system memory. The flaw does not require user interaction and can be triggered by arbitrary firmware input.
Affected Systems
Affected devices are MediaTek chipsets, including the MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883, and other MediaTek SoCs listed in the CPE data. Specific firmware or kernel versions are not detailed in the advisories.
Risk and Exploitability
The base CVSS score of 6.7 indicates moderate severity; the EPSS score is below 1%, suggesting a low but non‑zero chance of exploitation. The flaw is listed as not in the CISA KEV catalog, so no known public exploits are tracked. Exploitation requires local access with system privileges and physical or remote access to the target device. When these conditions exist, an attacker can leverage the memory corruption to gain higher privileges within the system.
OpenCVE Enrichment