{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T19:20:25.292","vulnerabilities":[{"cve":{"id":"CVE-2024-20017","sourceIdentifier":"security@mediatek.com","published":"2024-03-04T03:15:06.970","lastModified":"2025-05-05T17:48:05.470","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132."},{"lang":"es","value":"En el servicio WLAN, existe una posible escritura fuera de los límites debido a una validación de entrada incorrecta. Esto podría conducir a una escalada local de privilegios sin necesidad de permisos de ejecución adicionales. No se necesita la interacción del usuario para la explotación. ID de parche: WCNCR00350938; ID del problema: MSV-1132."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-20"},{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*","versionEndIncluding":"7.4.0.1","matchCriteriaId":"9C3A1278-7DC1-4E66-8F57-4B585A4838ED"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*","matchCriteriaId":"55EB4B27-6264-45BE-9A22-BE8418BB0C06"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*","matchCriteriaId":"3AB22996-9C22-4B6C-9E94-E4C055D16335"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*","versionEndIncluding":"7.6.7.0","matchCriteriaId":"521ABF30-6B3D-466F-83D4-E2C4297E27C7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*","matchCriteriaId":"DD5AA441-5381-4179-89EB-1642120F72B4"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*","matchCriteriaId":"490CD97B-021F-4350-AEE7-A2FA866D5889"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*","matchCriteriaId":"40A9E917-4B34-403F-B512-09EEBEA46811"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*","matchCriteriaId":"4FA469E2-9E63-4C9A-8EBA-10C8C870063A"},{"vulnerable":true,"criteria":"cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*","matchCriteriaId":"F0133207-2EED-4625-854F-8DB7770D5BF7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*","matchCriteriaId":"171D1C08-F055-44C0-913C-AA2B73AF5B72"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/March-2024","source":"security@mediatek.com","tags":["Vendor Advisory"]},{"url":"https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Technical Description","Third Party Advisory"]},{"url":"https://blog.sonicwall.com/en-us/2024/09/critical-exploit-in-mediatek-wi-fi-chipsets-zero-click-vulnerability-cve-2024-20017-threatens-routers-and-smartphones/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://corp.mediatek.com/product-security-bulletin/March-2024","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://news.ycombinator.com/item?id=41605680","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}