ID

VAR-202601-0271


CVE

CVE-2025-20794


TITLE

media tech's NR15 Stack-based buffer overflow vulnerability in multiple products, including

Trust: 0.8

sources: JVNDB: JVNDB-2026-001075

DESCRIPTION

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689259 / MOLY01586470; Issue ID: MSV-4847. Patch ID teeth MOLY01689259 / MOLY01586470 And the problem ID teeth MSV-4847 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2025-20794 // JVNDB: JVNDB-2026-001075

AFFECTED PRODUCTS

vendor:mediatekmodel:nr17scope:eqversion: -

Trust: 1.0

vendor:mediatekmodel:nr16scope:eqversion: -

Trust: 1.0

vendor:mediatekmodel:nr17rscope:eqversion: -

Trust: 1.0

vendor:mediatekmodel:nr15scope:eqversion: -

Trust: 1.0

vendor:メディアテックmodel:nr16scope: - version: -

Trust: 0.8

vendor:メディアテックmodel:nr15scope: - version: -

Trust: 0.8

vendor:メディアテックmodel:nr17scope: - version: -

Trust: 0.8

vendor:メディアテックmodel:nr17rscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-001075 // NVD: CVE-2025-20794

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-20794
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-001075
value: HIGH

Trust: 0.8

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-20794
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2026-001075
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-001075 // NVD: CVE-2025-20794

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-001075 // NVD: CVE-2025-20794

PATCH

title:January 2026url:https://corp.mediatek.com/product-security-bulletin/January-2026

Trust: 0.8

sources: JVNDB: JVNDB-2026-001075

EXTERNAL IDS

db:NVDid:CVE-2025-20794

Trust: 2.6

db:JVNDBid:JVNDB-2026-001075

Trust: 0.8

sources: JVNDB: JVNDB-2026-001075 // NVD: CVE-2025-20794

REFERENCES

url:https://corp.mediatek.com/product-security-bulletin/january-2026

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-20794

Trust: 0.8

sources: JVNDB: JVNDB-2026-001075 // NVD: CVE-2025-20794

SOURCES

db:JVNDBid:JVNDB-2026-001075
db:NVDid:CVE-2025-20794

LAST UPDATE DATE

2026-01-16T22:53:28.893000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-001075date:2026-01-13T05:54:00
db:NVDid:CVE-2025-20794date:2026-01-08T19:24:31.137

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-001075date:2026-01-13T00:00:00
db:NVDid:CVE-2025-20794date:2026-01-06T02:15:43.297