Cyber Security News

MediaTek Security Update – Patch for Vulnerabilities Affecting Smartphone, Tablet, & other Devices

MediaTek has released a critical security update addressing multiple vulnerabilities in its chipsets, with one critical flaw that could potentially allow attackers to execute malicious code remotely on affected devices without user interaction

The bulletin, published today, highlights significant security risks affecting a wide array of devices, including smartphones, tablets, IoT devices, smart displays, and various multimedia equipment.

Critical Vulnerability Details

This security update centers on CVE-2025-20654, a critical vulnerability in the WLAN service component of multiple MediaTek chipsets. 

This flaw stems from an out-of-bounds write vulnerability caused by an incorrect bounds check, classified under CWE-787 (Out-of-bounds Write). 

The vulnerability enables remote code execution without requiring additional execution privileges or user interaction.

The vulnerability affects several widely-deployed chipsets, including MT6890, MT7622, MT7915, MT7916, MT7981, and MT7986.

Application Security is no longer just a defensive play, Time to Secure -> Free Webinar

Affected software versions encompass SDK version 7.4.0.1 for MT7622 and MT7915 chipsets, SDK version 7.6.7.0 for MT7916, MT7981, and MT7986 chipsets, as well as OpenWrt versions 19.07 and 21.02 for the MT6890 chipset.

Additional Security Concerns

The security bulletin also addresses several high-severity vulnerabilities, including CVE-2025-20655, CVE-2025-20656, CVE-2025-20657, and CVE-2025-20658. 

These vulnerabilities could potentially lead to remote code execution, local privilege escalation, or denial of service in various components of affected devices. 

Additionally, six medium-severity flaws (CVE-2025-20659 through CVE-2025-20664) have been identified and patched.

Manufacturers using affected MediaTek chipsets are strongly advised to review the complete Product Security Bulletin and implement the recommended patches immediately. 

End-users should ensure their devices are running the latest firmware versions by checking for and installing available updates.

This security update exemplifies MediaTek’s ongoing commitment to maintaining the integrity and security of its technology ecosystem, protecting millions of devices and their users worldwide from potential exploitation.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try 50 Request for Free

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Microsoft Introduces Researcher in 365 Copilot: Your Secure Virtual Assistant for Enhanced Productivity

Microsoft has launched Researcher with Computer Use in Microsoft 365 Copilot, marking a significant advancement…

20 minutes ago

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads

A new wave of cyber threats is emerging as criminals increasingly weaponize AdaptixC2, a free…

2 hours ago

Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability

Chinese-affiliated threat actor UNC6384 has been actively leveraging a critical Windows shortcut vulnerability to target…

4 hours ago

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access

Threat actors operating under the control of North Korea's regime have demonstrated continued technical sophistication…

4 hours ago

Threat Actors Using Multilingual ZIP File to Attack Financial and Government Organizations

Sophisticated threat actors have orchestrated a coordinated multilingual phishing campaign targeting financial and government organizations…

5 hours ago

AzureHound Penetration Testing Tool Weaponized by Threat Actors to Enumerate Azure and Entra ID

AzureHound, an open-source data collection tool designed for legitimate penetration testing and security research, has…

5 hours ago