{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T23:54:29.121","vulnerabilities":[{"cve":{"id":"CVE-2025-20664","sourceIdentifier":"security@mediatek.com","published":"2025-04-07T04:15:20.420","lastModified":"2025-04-11T15:52:40.517","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In wlan AP driver, there is a possible information disclosure due to an uncaught exception. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00406217; Issue ID: MSV-2773."},{"lang":"es","value":"En el controlador del punto de acceso WLAN, existe una posible divulgación de información debido a una excepción no detectada. Esto podría provocar la divulgación de información remota (proximal/adyacente) sin necesidad de privilegios de ejecución adicionales. No se requiere la interacción del usuario para su explotación. ID de parche: WCNCR00406217; ID de problema: MSV-2773."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@mediatek.com","type":"Secondary","description":[{"lang":"en","value":"CWE-248"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*","versionEndIncluding":"7.4.0.1","matchCriteriaId":"9C3A1278-7DC1-4E66-8F57-4B585A4838ED"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*","matchCriteriaId":"3AB22996-9C22-4B6C-9E94-E4C055D16335"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*","versionEndIncluding":"7.6.7.2","matchCriteriaId":"0DD86CC1-BD46-42D2-9112-190CCAC96B30"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*","matchCriteriaId":"DD5AA441-5381-4179-89EB-1642120F72B4"},{"vulnerable":true,"criteria":"cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*","matchCriteriaId":"490CD97B-021F-4350-AEE7-A2FA866D5889"},{"vulnerable":true,"criteria":"cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*","matchCriteriaId":"40A9E917-4B34-403F-B512-09EEBEA46811"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*","versionEndIncluding":"8.2.1.4","matchCriteriaId":"98A0A038-9A30-402E-9A81-1216F974F905"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:mediatek:mt7990:-:*:*:*:*:*:*:*","matchCriteriaId":"4901B2A5-B0C8-4A0C-AC17-87D469744817"},{"vulnerable":true,"criteria":"cpe:2.3:h:mediatek:mt7992:-:*:*:*:*:*:*:*","matchCriteriaId":"50D01D7D-A88D-471D-A23A-42AF4DF82952"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/April-2025","source":"security@mediatek.com","tags":["Vendor Advisory"]}]}}]}