{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T13:42:47.919","vulnerabilities":[{"cve":{"id":"CVE-2024-20006","sourceIdentifier":"security@mediatek.com","published":"2024-02-05T06:15:47.233","lastModified":"2024-11-21T08:51:46.967","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477148; Issue ID: ALPS08477148."},{"lang":"es","value":"En da, existe una posible escritura fuera de los límites debido a una verificación de los límites faltantes. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: ALPS08477148; ID del problema: ALPS08477148."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.7,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*","matchCriteriaId":"A1488152-CC93-40DF-8D1F-BF33DC8444FF"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*","matchCriteriaId":"109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"},{"vulnerable":true,"criteria":"cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*","matchCriteriaId":"4FA469E2-9E63-4C9A-8EBA-10C8C870063A"},{"vulnerable":true,"criteria":"cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*","matchCriteriaId":"F0133207-2EED-4625-854F-8DB7770D5BF7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*","matchCriteriaId":"7D1135F9-E38C-4308-BD32-A4D83959282E"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*","matchCriteriaId":"C4EEE021-6B2A-47A0-AC6B-55525A40D718"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*","matchCriteriaId":"68CF4A7A-3136-4C4C-A795-81323896BE11"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*","matchCriteriaId":"171D1C08-F055-44C0-913C-AA2B73AF5B72"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*","matchCriteriaId":"A4675A09-0147-4690-8AA1-E3802CA1B3EB"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/February-2024","source":"security@mediatek.com","tags":["Vendor Advisory"]},{"url":"https://corp.mediatek.com/product-security-bulletin/February-2024","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}