Description
In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211()

Check frame length before accessing the mgmt fields in
mt7925_mac_write_txwi_80211 in order to avoid a possible oob access.
Published: 2026-03-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Kernel memory corruption and potential system crash
Action: Apply patch
AI Analysis

Impact

A memory controller in the Linux kernel’s mt7925 Wi‑Fi driver can read or write outside the bounds of a buffer when handling certain transmission control frames. This out‑of‑bounds access can corrupt kernel memory, leading to a crash or other instability of the operating system. The flaw does not grant direct privilege escalation; its most severe consequence is loss of availability.

Affected Systems

Linux kernel builds that include the mt76 driver with the mt7925 module and have not yet incorporated the upstream patch are vulnerable. Devices that rely on the mt7925 wireless chip, such as many consumer laptop and embedded adapters, are within scope. The vulnerability exists in the kernel component that interfaces directly with Wi‑Fi hardware and is not limited to a specific kernel version beyond those that lack the patch.

Risk and Exploitability

The score of 5.5 reflects a moderate impact, while the probability of exploitation is judged to be low, based on an estimated likelihood of under 1%. The vulnerability is not catalogued as a widely exploited issue. An attacker would need to transmit a specially crafted Wi‑Fi packet that reaches the vulnerable driver, implying a remote, network‑based attack vector. Successful exploitation would likely cause a kernel crash or memory corruption, disrupting service but not necessarily elevating privileges.

Generated by OpenCVE AI on March 26, 2026 at 05:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the mt7925 patch
  • If an official update is not yet available, apply the upstream source patch manually

Generated by OpenCVE AI on March 26, 2026 at 05:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
CPEs cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}


Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-805
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211() Check frame length before accessing the mgmt fields in mt7925_mac_write_txwi_80211 in order to avoid a possible oob access.
Title wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:05:50.516Z

Reserved: 2026-01-13T15:37:46.002Z

Link: CVE-2026-23363

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T11:16:35.407

Modified: 2026-04-24T18:48:32.070

Link: CVE-2026-23363

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23363 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:15:55Z

Weaknesses