CVE-2025-47384
MEDIUM
2026-03-02
[email protected]
6.5
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Lifecycle Timeline
2
Analysis Generated
Mar 12, 2026 - 21:55 vuln.today
CVE Published
Mar 02, 2026 - 17:16 nvd
MEDIUM 6.5
Tags
Denial Of Service
Qca6391 Firmware
5g Fixed Wireless Access Platform Firmware
Snapdragon 690 5g Mobile Platform Firmware
Wsa8835 Firmware
Qca6698aq Firmware
Qcm6490 Firmware
Qca6696 Firmware
Wcd9341 Firmware
Sm7325p Firmware
Wcd9380 Firmware
Wsa8815 Firmware
Snapdragon 778g 5g Mobile Platform Firmware
Snapdragon 480 5g Mobile Platform Firmware
Wsa8830 Firmware
Fastconnect 6200 Firmware
Snapdragon 888 5g Mobile Platform Firmware
Wcd9360 Firmware
Snapdragon X55 5g Modem Rf System Firmware
Qca6574a Firmware
Snapdragon Auto 5g Modem Rf Firmware
Wsa8810 Firmware
Wcn3988 Firmware
Fastconnect 6700 Firmware
Snapdragon 695 5g Mobile Platform Firmware
Wcd9375 Firmware
Snapdragon X53 5g Modem Rf System Firmware
Snapdragon 870 5g Mobile Platform Firmware
Snapdragon 865 5g Mobile Platform Firmware
Snapdragon 782g Mobile Platform Firmware
Wcd9385 Firmware
Fastconnect 6900 Firmware
Sdx57m Firmware
Video Collaboration Vc3 Platform Firmware
Qca6595au Firmware
Wcd9370 Firmware
Snapdragon 4 Gen 1 Mobile Platform Firmware
Qcm5430 Firmware
Fastconnect 6800 Firmware
Description
Transient DOS when MAC configures config id greater than supported maximum value.
Analysis
5G Fixed Wireless Access Platform Firmware versions up to - is affected by reachable assertion (CVSS 6.5).
Technical Context
This vulnerability (CWE-617: Reachable Assertion) affects 5G Fixed Wireless Access Platform Firmware. Transient DOS when MAC configures config id greater than supported maximum value.
Affected Products
Vendor: Qualcomm. Product: 5G Fixed Wireless Access Platform Firmware. Versions: up to -.
Remediation
Monitor vendor advisories for a patch.
Priority Score
33
Low
Medium
High
Critical
KEV: 0
EPSS: +0.0
CVSS: +32
POC: 0
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).