Impact
A memory controller in the Linux kernel’s mt7925 Wi‑Fi driver can read or write outside the bounds of a buffer when handling certain transmission control frames. This out‑of‑bounds access can corrupt kernel memory, leading to a crash or other instability of the operating system. The flaw does not grant direct privilege escalation; its most severe consequence is loss of availability.
Affected Systems
Linux kernel builds that include the mt76 driver with the mt7925 module and have not yet incorporated the upstream patch are vulnerable. Devices that rely on the mt7925 wireless chip, such as many consumer laptop and embedded adapters, are within scope. The vulnerability exists in the kernel component that interfaces directly with Wi‑Fi hardware and is not limited to a specific kernel version beyond those that lack the patch.
Risk and Exploitability
The score of 5.5 reflects a moderate impact, while the probability of exploitation is judged to be low, based on an estimated likelihood of under 1%. The vulnerability is not catalogued as a widely exploited issue. An attacker would need to transmit a specially crafted Wi‑Fi packet that reaches the vulnerable driver, implying a remote, network‑based attack vector. Successful exploitation would likely cause a kernel crash or memory corruption, disrupting service but not necessarily elevating privileges.
OpenCVE Enrichment