In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/March-2024 | Vendor Advisory |
https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html | Exploit Technical Description Third Party Advisory |
https://blog.sonicwall.com/en-us/2024/09/critical-exploit-in-mediatek-wi-fi-chipsets-zero-click-vulnerability-cve-2024-20017-threatens-routers-and-smartphones/ | Exploit Third Party Advisory |
https://corp.mediatek.com/product-security-bulletin/March-2024 | Vendor Advisory |
https://news.ycombinator.com/item?id=41605680 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
05 May 2025, 17:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Mediatek
Mediatek software Development Kit Mediatek mt7622 Openwrt Mediatek mt6890 Openwrt openwrt Mediatek mt7986 Mediatek mt7915 Mediatek mt7981 Mediatek mt7916 |
|
CPE | cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:* |
|
References | () https://corp.mediatek.com/product-security-bulletin/March-2024 - Vendor Advisory | |
References | () https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html - Exploit, Technical Description, Third Party Advisory | |
References | () https://blog.sonicwall.com/en-us/2024/09/critical-exploit-in-mediatek-wi-fi-chipsets-zero-click-vulnerability-cve-2024-20017-threatens-routers-and-smartphones/ - Exploit, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=41605680 - Third Party Advisory |
21 Nov 2024, 08:51
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://corp.mediatek.com/product-security-bulletin/March-2024 - |
25 Sep 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-20 |
26 Aug 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-787 |
07 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132. |
04 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-04 03:15
Updated : 2025-05-05 17:48
NVD link : CVE-2024-20017
Mitre link : CVE-2024-20017
CVE.ORG link : CVE-2024-20017
JSON object : View
Products Affected
mediatek
- mt7981
- mt7915
- mt7916
- software_development_kit
- mt7986
- mt7622
- mt6890
openwrt
- openwrt