In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/March-2024 | Vendor Advisory |
https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html | Exploit Technical Description Third Party Advisory |
https://blog.sonicwall.com/en-us/2024/09/critical-exploit-in-mediatek-wi-fi-chipsets-zero-click-vulnerability-cve-2024-20017-threatens-routers-and-smartphones/ | Exploit Third Party Advisory |
https://corp.mediatek.com/product-security-bulletin/March-2024 | Vendor Advisory |
https://news.ycombinator.com/item?id=41605680 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
05 May 2025, 17:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://corp.mediatek.com/product-security-bulletin/March-2024 - Vendor Advisory | |
References | () https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html - Exploit, Technical Description, Third Party Advisory | |
References | () https://blog.sonicwall.com/en-us/2024/09/critical-exploit-in-mediatek-wi-fi-chipsets-zero-click-vulnerability-cve-2024-20017-threatens-routers-and-smartphones/ - Exploit, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=41605680 - Third Party Advisory | |
First Time |
Mediatek mt7986
Mediatek Openwrt openwrt Mediatek mt7622 Mediatek software Development Kit Mediatek mt7915 Mediatek mt7916 Openwrt Mediatek mt6890 Mediatek mt7981 |
|
CPE | cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:* cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:* |
21 Nov 2024, 08:51
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://corp.mediatek.com/product-security-bulletin/March-2024 - |
25 Sep 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-20 |
26 Aug 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
07 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132. |
04 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-04 03:15
Updated : 2025-05-05 17:48
NVD link : CVE-2024-20017
Mitre link : CVE-2024-20017
CVE.ORG link : CVE-2024-20017
JSON object : View
Products Affected
mediatek
- mt7622
- software_development_kit
- mt7915
- mt7916
- mt7981
- mt6890
- mt7986
openwrt
- openwrt