CVE-2025-27034

CRITICAL
2025-09-24 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Mar 28, 2026 - 19:14 vuln.today
CVE Published
Sep 24, 2025 - 16:15 nvd
CRITICAL 9.8

Tags

Buffer Overflow Fastconnect 6900 Firmware Fastconnect 7800 Firmware Qca6174a Firmware Qca6391 Firmware Qca6574a Firmware Qca6584au Firmware Qca6595au Firmware Qca6696 Firmware Qca6698aq Firmware Qca8081 Firmware Qca8337 Firmware Qcc710 Firmware Qcm4490 Firmware Qcm5430 Firmware Qcm6490 Firmware Qcm8550 Firmware Qcn6024 Firmware Qcn6224 Firmware Qcn6274 Firmware Qcn9024 Firmware Qcs4490 Firmware Qcs5430 Firmware Qcs6490 Firmware Qcs8550 Firmware Qep8111 Firmware Qfw7114 Firmware Qfw7124 Firmware Video Collaboration Vc3 Platform Firmware Sd 8 Gen1 5g Firmware Sdx55 Firmware Sdx57m Firmware Sdx61 Firmware Sdx71m Firmware Sdx80m Firmware Sg8275p Firmware Sm4635 Firmware Sm6650 Firmware Sm7250p Firmware Sm7325p Firmware Sm7635 Firmware 315 5g Iot Modem Firmware Ar8035 Firmware Fastconnect 6200 Firmware Fastconnect 6700 Firmware Fastconnect 6800 Firmware Sm7675 Firmware Sm7675p Firmware Sm8550p Firmware Sm8635 Firmware Sm8635p Firmware Sm8650q Firmware Sm8750 Firmware Sm8750p Firmware Snapdragon 4 Gen 1 Mobile Platform Firmware Snapdragon 480 5g Mobile Platform Firmware Snapdragon 480 5G Mobile Platform Sm4350 Ac Firmware Snapdragon 690 5g Mobile Platform Firmware Snapdragon 695 5g Mobile Platform Firmware Snapdragon 765 5G Mobile Platform Sm7250 Aa Firmware Snapdragon 765G 5G Mobile Platform Sm7250 Ab Firmware Snapdragon 768G 5G Mobile Platform Sm7250 Ac Firmware Snapdragon 778g 5g Mobile Platform Firmware Snapdragon 778G 5G Mobile Platform Sm7325 Ae Firmware Snapdragon 780g 5g Mobile Platform Firmware Snapdragon 782G Mobile Platform Sm7325 Af Firmware Snapdragon 7C Gen 3 Compute Firmware Snapdragon 8 Gen 1 Mobile Platform Firmware Snapdragon 8 Gen 2 Mobile Platform Firmware Snapdragon 8 Gen 3 Mobile Platform Firmware Snapdragon 865 5g Mobile Platform Firmware Snapdragon 865 5G Mobile Platform Sm8250 Ab Firmware Snapdragon 870 5G Mobile Platform Sm8250 Ac Firmware Snapdragon 888 5g Mobile Platform Firmware Snapdragon 888 5G Mobile Platform Sm8350 Ac Firmware Snapdragon Auto 5g Modem Rf Firmware Snapdragon Auto 5g Modem Rf Gen 2 Firmware Snapdragon X35 5g Modem Rf System Firmware Snapdragon X55 5g Modem Rf System Firmware Snapdragon X62 5g Modem Rf System Firmware Snapdragon X65 5g Modem Rf System Firmware Snapdragon X70 Modem Rf System Firmware Snapdragon X72 5g Modem Rf System Firmware Snapdragon X75 5g Modem Rf System Firmware Wcd9340 Firmware Wcd9341 Firmware Wcd9360 Firmware Wcd9370 Firmware Wcd9375 Firmware Wcd9378 Firmware Wcd9380 Firmware Wcd9385 Firmware Wcd9390 Firmware Wcd9395 Firmware Wcn3950 Firmware Wcn3988 Firmware Wcn6450 Firmware Wcn6650 Firmware Wcn6740 Firmware Wcn6755 Firmware Wcn7860 Firmware Wcn7861 Firmware Wcn7880 Firmware Wcn7881 Firmware Wsa8810 Firmware Wsa8815 Firmware Wsa8830 Firmware Wsa8832 Firmware Wsa8835 Firmware Wsa8840 Firmware Wsa8845 Firmware Wsa8845h Firmware

Description

Memory corruption while selecting the PLMN from SOR failed list.

Analysis

Memory corruption while selecting the PLMN from SOR failed list. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Technical Context

This vulnerability is classified under CWE-129. Memory corruption while selecting the PLMN from SOR failed list. Affected products include: Qualcomm Fastconnect 6900 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Qca6174A Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca6574A Firmware.

Affected Products

Qualcomm Fastconnect 6900 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Qca6174A Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca6574A Firmware.

Remediation

No vendor patch is available at time of analysis. Monitor vendor advisories for updates. Apply vendor patches when available. Implement network segmentation and monitoring as interim mitigations.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +49
POC: 0

Share

CVE-2025-27034 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy