2025-07-08
[email protected]
7.8
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Lifecycle Timeline
3
Analysis Generated
Mar 16, 2026 - 04:21 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 04:21 euvd
EUVD-2025-20473
CVE Published
Jul 08, 2025 - 13:15 nvd
HIGH 7.8
Tags
Buffer Overflow
Wsa8810 Firmware
Sc8180x Ad Firmware
Wsa8845h Firmware
Sm6250 Firmware
Snapdragon 7c Compute Firmware
Fastconnect 7800 Firmware
Wcd9341 Firmware
Sc8380xp Firmware
Qcm6490 Firmware
Wcd9370 Firmware
Qca6391 Firmware
Qca6430 Firmware
Sc8180xp Ad Firmware
Fastconnect 6700 Firmware
Qca6420 Firmware
Wsa8830 Firmware
Sc8180xp Acaf Firmware
Fastconnect 6200 Firmware
Wcd9340 Firmware
Aqt1000 Firmware
Qcs6490 Firmware
Wsa8835 Firmware
Wcd9385 Firmware
Sc8180x Acaf Firmware
Fastconnect 6900 Firmware
Wcd9380 Firmware
Wsa8815 Firmware
Qcm5430 Firmware
Wcd9375 Firmware
Qcs5430 Firmware
Snapdragon 7c Gen 2 Compute Firmware
Video Collaboration Vc3 Platform Firmware
Fastconnect 6800 Firmware
Wsa8845 Firmware
Sc8280xp Abbb Firmware
Sc8180x Aaab Firmware
Sc8180xp Aaab Firmware
Wsa8840 Firmware
Description
Memory corruption during the image encoding process.
Analysis
Memory corruption during the image encoding process.
Technical Context
This vulnerability is classified as Buffer Over-read (CWE-126).
Affected Products
Affected products: Qualcomm Aqt1000 Firmware -, Qualcomm Fastconnect 6200 Firmware -, Qualcomm Fastconnect 6700 Firmware -, Qualcomm Fastconnect 6800 Firmware -, Qualcomm Fastconnect 6900 Firmware -
Remediation
Monitor vendor advisories for patches. Apply mitigations such as network segmentation, access restrictions, and monitoring.
Priority Score
39
Low
Medium
High
Critical
KEV: 0
EPSS: +0.0
CVSS: +39
POC: 0
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2025-20473