In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.
References
| Link | Resource |
|---|---|
| https://corp.mediatek.com/product-security-bulletin/March-2024 | Vendor Advisory |
| https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html | Exploit Technical Description Third Party Advisory |
| https://blog.sonicwall.com/en-us/2024/09/critical-exploit-in-mediatek-wi-fi-chipsets-zero-click-vulnerability-cve-2024-20017-threatens-routers-and-smartphones/ | Exploit Third Party Advisory |
| https://corp.mediatek.com/product-security-bulletin/March-2024 | Vendor Advisory |
| https://news.ycombinator.com/item?id=41605680 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2024-03-04 03:15
Updated : 2025-05-05 17:48
NVD link : CVE-2024-20017
Mitre link : CVE-2024-20017
CVE.ORG link : CVE-2024-20017
JSON object : View
Products Affected
mediatek
- mt7916
- mt6890
- mt7986
- mt7981
- mt7915
- mt7622
- software_development_kit
openwrt
- openwrt
