In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303.
2025-06-02T03:15:24.737
2025-07-18T17:16:22.560
Analyzed
CVSSv3.1: 9.8 (CRITICAL)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | openwrt | openwrt | 19.07.0 | Yes |
Operating System | openwrt | openwrt | 21.02.0 | Yes |
Hardware | mediatek | mt6890 | - | No |
Operating System | openwrt | openwrt | 21.02.0 | Yes |
Operating System | openwrt | openwrt | 23.05 | Yes |
Hardware | mediatek | mt6990 | - | No |
Application | mediatek | software_development_kit | ≤ 7.6.7.2 | Yes |
Hardware | mediatek | mt6890 | - | No |
Hardware | mediatek | mt6990 | - | No |
Hardware | mediatek | mt7915 | - | No |
Hardware | mediatek | mt7916 | - | No |
Hardware | mediatek | mt7981 | - | No |
Hardware | mediatek | mt7986 | - | No |
Hardware | mediatek | mt7990 | - | No |
Hardware | mediatek | mt7992 | - | No |
Hardware | mediatek | mt7993 | - | No |