Vulnerabilities (CVE)

Filtered by vendor Openwrt Subscribe
Filtered by product Openwrt
Total 107 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-62525 1 Openwrt 1 Openwrt 2025-10-30 N/A 7.9 HIGH
OpenWrt Project is a Linux operating system targeting embedded devices. Prior to version 24.10.4, local users could read and write arbitrary kernel memory using the ioctls of the ltq-ptm driver which is used to drive the datapath of the DSL line. This only effects the lantiq target supporting xrx200, danube and amazon SoCs from Lantiq/Intel/MaxLinear with the DSL in PTM mode. The DSL driver for the VRX518 is not affected. ATM mode is also not affected. Most VDSL lines use PTM mode and most ADSL lines use ATM mode. OpenWrt is normally running as a single user system, but some services are sandboxed. This vulnerability could allow attackers to escape a ujail sandbox or other contains. This is fixed in OpenWrt 24.10.4. There are no workarounds.
CVE-2025-62526 1 Openwrt 1 Openwrt 2025-10-30 N/A 7.9 HIGH
OpenWrt Project is a Linux operating system targeting embedded devices. Prior to version 24.10.4, ubusd contains a heap buffer overflow in the event registration parsing code. This allows an attacker to modify the head and potentially execute arbitrary code in the context of the ubus daemon. The affected code is executed before running the ACL checks, all ubus clients are able to send such messages. In addition to the heap corruption, the crafted subscription also results in a bypass of the listen ACL. This is fixed in OpenWrt 24.10.4. There are no workarounds.
CVE-2025-20710 2 Mediatek, Openwrt 7 Mt6890, Mt7915, Mt7916 and 4 more 2025-10-16 N/A 8.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an integer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418785; Issue ID: MSV-3515.
CVE-2025-20711 2 Mediatek, Openwrt 6 Mt6890, Mt7916, Mt7981 and 3 more 2025-10-16 N/A 8.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00422399; Issue ID: MSV-3748.
CVE-2025-20712 2 Mediatek, Openwrt 7 Mt6990, Mt7990, Mt7991 and 4 more 2025-10-16 N/A 8.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00422323; Issue ID: MSV-3810.
CVE-2025-20713 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-10-16 N/A 7.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00432661; Issue ID: MSV-3904.
CVE-2025-20724 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-10-16 N/A 5.5 MEDIUM
In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418894; Issue ID: MSV-3475.
CVE-2025-20709 2 Mediatek, Openwrt 7 Mt6890, Mt7915, Mt7916 and 4 more 2025-10-15 N/A 8.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00415809; Issue ID: MSV-3405.
CVE-2025-20714 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-10-15 N/A 7.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00432659; Issue ID: MSV-3902.
CVE-2025-20716 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-10-15 N/A 7.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00421149; Issue ID: MSV-3728.
CVE-2025-20717 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-10-15 N/A 7.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00419946; Issue ID: MSV-3582.
CVE-2025-20718 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-10-15 N/A 7.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00419945; Issue ID: MSV-3581.
CVE-2025-20719 2 Mediatek, Openwrt 10 Mt6890, Mt7603, Mt7615 and 7 more 2025-10-15 N/A 8.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418955; Issue ID: MSV-3570.
CVE-2025-20720 2 Mediatek, Openwrt 10 Mt6890, Mt7603, Mt7615 and 7 more 2025-10-15 N/A 8.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418954; Issue ID: MSV-3569.
CVE-2025-20722 4 Google, Mediatek, Openwrt and 1 more 19 Android, Mt6835, Mt6878 and 16 more 2025-10-15 N/A 5.5 MEDIUM
In gnss driver, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09920036; Issue ID: MSV-3798.
CVE-2025-20715 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-10-15 N/A 7.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00421152; Issue ID: MSV-3731.
CVE-2025-20705 4 Google, Linuxfoundation, Mediatek and 1 more 42 Android, Yocto, Mt2718 and 39 more 2025-09-03 N/A 7.8 HIGH
In monitor_hang, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09989078; Issue ID: MSV-3964.
CVE-2025-20696 6 Google, Linuxfoundation, Mediatek and 3 more 37 Android, Yocto, Mt6739 and 34 more 2025-08-18 N/A 6.8 MEDIUM
In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09915215; Issue ID: MSV-3801.
CVE-2025-20674 2 Mediatek, Openwrt 11 Mt6890, Mt6990, Mt7915 and 8 more 2025-07-18 N/A 9.8 CRITICAL
In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303.
CVE-2025-20695 3 Google, Mediatek, Openwrt 14 Android, Mt6639, Mt6653 and 11 more 2025-07-14 N/A 6.5 MEDIUM
In Bluetooth FW, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09741871; Issue ID: MSV-3317.