In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/March-2024 | Vendor Advisory |
https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html | Exploit Technical Description Third Party Advisory |
https://blog.sonicwall.com/en-us/2024/09/critical-exploit-in-mediatek-wi-fi-chipsets-zero-click-vulnerability-cve-2024-20017-threatens-routers-and-smartphones/ | Exploit Third Party Advisory |
https://corp.mediatek.com/product-security-bulletin/March-2024 | Vendor Advisory |
https://news.ycombinator.com/item?id=41605680 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
05 May 2025, 17:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:* cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:* |
|
First Time |
Openwrt
Mediatek Mediatek mt7916 Mediatek mt7986 Mediatek mt7915 Mediatek mt6890 Mediatek mt7622 Mediatek software Development Kit Openwrt openwrt Mediatek mt7981 |
|
References | () https://corp.mediatek.com/product-security-bulletin/March-2024 - Vendor Advisory | |
References | () https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html - Exploit, Technical Description, Third Party Advisory | |
References | () https://blog.sonicwall.com/en-us/2024/09/critical-exploit-in-mediatek-wi-fi-chipsets-zero-click-vulnerability-cve-2024-20017-threatens-routers-and-smartphones/ - Exploit, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=41605680 - Third Party Advisory |
21 Nov 2024, 08:51
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://corp.mediatek.com/product-security-bulletin/March-2024 - |
25 Sep 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-20 |
26 Aug 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-787 |
07 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132. |
04 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-04 03:15
Updated : 2025-05-05 17:48
NVD link : CVE-2024-20017
Mitre link : CVE-2024-20017
CVE.ORG link : CVE-2024-20017
JSON object : View
Products Affected
openwrt
- openwrt
mediatek
- mt7622
- mt6890
- mt7981
- software_development_kit
- mt7916
- mt7986
- mt7915