{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T20:07:09.018","vulnerabilities":[{"cve":{"id":"CVE-2025-20631","sourceIdentifier":"security@mediatek.com","published":"2025-02-03T04:15:08.060","lastModified":"2025-04-22T13:50:41.370","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00397141; Issue ID: MSV-2187."},{"lang":"es","value":"En el controlador de punto de acceso WLAN, existe una posible escritura fuera de los límites debido a una verificación de los límites incorrecta. Esto podría provocar una escalada local de privilegios sin necesidad de permisos de ejecución adicionales. No se necesita interacción del usuario para la explotación. ID de parche: WCNCR00397141; ID de problema: MSV-2187."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@mediatek.com","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*","versionEndIncluding":"7.6.7.2","matchCriteriaId":"0DD86CC1-BD46-42D2-9112-190CCAC96B30"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*","matchCriteriaId":"05748BB1-0D48-4097-932E-E8E2E574FD8D"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*","matchCriteriaId":"55EB4B27-6264-45BE-9A22-BE8418BB0C06"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*","matchCriteriaId":"10C79211-F064-499D-914E-0BACD038FBF4"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*","matchCriteriaId":"3AB22996-9C22-4B6C-9E94-E4C055D16335"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*","matchCriteriaId":"DD5AA441-5381-4179-89EB-1642120F72B4"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*","matchCriteriaId":"490CD97B-021F-4350-AEE7-A2FA866D5889"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*","matchCriteriaId":"40A9E917-4B34-403F-B512-09EEBEA46811"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/February-2025","source":"security@mediatek.com","tags":["Vendor Advisory"]}]}}]}