CVE-2025-20746

In gnss service, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10010441; Issue ID: MSV-3967.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:23.05.0:-:*:*:*:*:*:*
cpe:2.3:o:zephyrproject:zephyr:3.7.0:-:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt2718:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6982:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*

History

05 Nov 2025, 17:11

Type Values Removed Values Added
First Time Mediatek mt6897
Mediatek mt8893
Mediatek mt2718
Google
Linuxfoundation
Openwrt
Mediatek mt6986d
Mediatek mt6899
Rdkcentral rdk-b
Mediatek mt6982
Mediatek mt8755
Mediatek mt2737
Mediatek mt6835
Mediatek mt6878
Mediatek mt6989
Mediatek mt6985
Mediatek mt6991
Rdkcentral
Mediatek mt6986
Google android
Zephyrproject
Mediatek mt6886
Mediatek mt6990
Mediatek mt8676
Mediatek mt8678
Openwrt openwrt
Linuxfoundation yocto
Zephyrproject zephyr
Mediatek
References () https://corp.mediatek.com/product-security-bulletin/November-2025 - () https://corp.mediatek.com/product-security-bulletin/November-2025 - Vendor Advisory
CWE CWE-787
CPE cpe:2.3:o:zephyrproject:zephyr:3.7.0:-:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:23.05.0:-:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2718:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6982:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*

04 Nov 2025, 14:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7

04 Nov 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-04 07:15

Updated : 2025-11-05 17:11


NVD link : CVE-2025-20746

Mitre link : CVE-2025-20746

CVE.ORG link : CVE-2025-20746


JSON object : View

Products Affected

mediatek

  • mt8678
  • mt2737
  • mt8676
  • mt8893
  • mt6986d
  • mt6899
  • mt6897
  • mt6982
  • mt6878
  • mt6991
  • mt6835
  • mt2718
  • mt8755
  • mt6886
  • mt6986
  • mt6990
  • mt6985
  • mt6989

linuxfoundation

  • yocto

rdkcentral

  • rdk-b

zephyrproject

  • zephyr

openwrt

  • openwrt

google

  • android
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write