CVE-2025-47366
HIGH
2026-02-02
[email protected]
7.1
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Lifecycle Timeline
2
Analysis Generated
Mar 12, 2026 - 22:01 vuln.today
CVE Published
Feb 02, 2026 - 16:16 nvd
HIGH 7.1
Tags
Information Disclosure
Sw5100 Firmware
Qcs9100 Firmware
Wcn3950 Firmware
Sa8145p Firmware
Flight Rb5 5g Firmware
Qcn6274 Firmware
Qrb5165m Firmware
Qca8695au Firmware
Qca6574 Firmware
Qfw7124 Firmware
Sa4150p Firmware
Snapdragon X75 5g Modem Rf Firmware
Wcn3910 Firmware
Wcn7880 Firmware
Sm8635p Firmware
Sa8295p Firmware
Wsa8840 Firmware
Robotics Rb5 Firmware
Wcn7881 Firmware
Sa8770p Firmware
Qmp1000 Firmware
Wsa8815 Firmware
Wcd9370 Firmware
Fastconnect 7800 Firmware
Snapdragon 6 Gen 1 Mobile Firmware
Sxr2350p Firmware
Wsa8845 Firmware
Wcn6650 Firmware
Qdu1010 Firmware
Qcs615 Firmware
Wcn6755 Firmware
Wcn7750 Firmware
Snapdragon 4 Gen 2 Mobile Firmware
Qcs4490 Firmware
Wcn3988 Firmware
Qfw7114 Firmware
Wcd9375 Firmware
Qcs5430 Firmware
Qca6574au Firmware
Fastconnect 6200 Firmware
Wsa8832 Firmware
Qca6688aq Firmware
Qcn6224 Firmware
Sm7675 Firmware
Snapdragon 8 Gen 1 Mobile Firmware
Sa8155p Firmware
Qca6584au Firmware
Qcm4490 Firmware
Sm8735 Firmware
Ssg2125p Firmware
Sa7775p Firmware
Qcs6490 Firmware
Sm6650 Firmware
Qamsrv1m Firmware
Sc8380xp Firmware
Qca6595au Firmware
Video Collaboration Vc5 Firmware
Snapdragon X72 5g Modem Rf Firmware
Qca6678aq Firmware
Qca6696 Firmware
Ar8035 Firmware
Sw5100p Firmware
Sa8255p Firmware
Qca6391 Firmware
Srv1l Firmware
Snapdragon 7 Gen 1 Mobile Firmware
Sm8475p Firmware
Snapdragon 695 5g Mobile Firmware
Sa8150p Firmware
Qca6797aq Firmware
Sm6475 Firmware
Sg4150p Firmware
Wcd9390 Firmware
Qcm5430 Firmware
Snapdragon Auto 5g Modem Rf Gen 2 Firmware
Sm8750 Firmware
Qru1062 Firmware
Sa8620p Firmware
Snapdragon 680 4g Mobile Firmware
Sa7255p Firmware
Qam8650p Firmware
Qam8255p Firmware
Fastconnect 6900 Firmware
Srv1h Firmware
Sa8775p Firmware
Qru1052 Firmware
Snapdragon 4 Gen 1 Mobile Firmware
Qam8775p Firmware
Sxr2330p Firmware
Sm6650p Firmware
Sxr1230p Firmware
Qca8081 Firmware
Qcc710 Firmware
Sa8650p Firmware
Wcn7860 Firmware
Sxr2250p Firmware
Sa8540p Firmware
Sm8750p Firmware
Qca8337 Firmware
Qcn9011 Firmware
Qam8295p Firmware
Wsa8830 Firmware
Wsa8810 Firmware
Snapdragon Ar1 Gen 1 Firmware
Wcd9378 Firmware
Qru1032 Firmware
Qdx1011 Firmware
Srv1m Firmware
Sm8650q Firmware
Snapdragon X35 5g Modem Rf Firmware
Sm7675p Firmware
Snapdragon 8 Gen 3 Mobile Firmware
Sd 8 Gen1 5g Firmware
Qcn9012 Firmware
Sa6150p Firmware
Video Collaboration Vc3 Firmware
Wcd9340 Firmware
Fastconnect 6700 Firmware
Qam8620p Firmware
Sm7435 Firmware
Sa9000p Firmware
Sa6155p Firmware
Qca6698aq Firmware
Sm7635p Firmware
Qca6174a Firmware
Snapdragon 662 Mobile Firmware
Sm7635 Firmware
Qamsrv1h Firmware
Qrb5165n Firmware
Wcd9380 Firmware
Qep8111 Firmware
Sa8195p Firmware
Wcd9385 Firmware
Wcd9395 Firmware
Ssg2115p Firmware
Snapdragon 685 4g Mobile Firmware
Qca6574a Firmware
Qca6595 Firmware
Wcn6740 Firmware
Qcs7230 Firmware
Sa6145p Firmware
Sm8635 Firmware
Snapdragon X32 5g Modem Rf Firmware
Wcn7861 Firmware
Snapdragon Ar2 Gen 1 Firmware
Snapdragon 480 5g Mobile Firmware
Sm4635 Firmware
Snapdragon 460 Mobile Firmware
Sm6225p Firmware
Wsa8845h Firmware
Qcm6490 Firmware
Sa4155p Firmware
Wsa8835 Firmware
Sxr2230p Firmware
Qdx1010 Firmware
Description
Cryptographic issue when a Trusted Zone with outdated code is triggered by a HLOS providing incorrect input.
Analysis
Cryptographic issue when a Trusted Zone with outdated code is triggered by a HLOS providing incorrect input. [CVSS 7.1 HIGH]
Technical Context
Affects Ar8035 Firmware. Cryptographic issue when a Trusted Zone with outdated code is triggered by a HLOS providing incorrect input.
Affected Products
Vendor: Qualcomm. Product: Ar8035 Firmware. Versions: up to -.
Remediation
Monitor vendor advisories for a patch.
Priority Score
36
Low
Medium
High
Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: 0
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).