CVE-2025-47396
HIGH
2026-01-07
[email protected]
7.8
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Lifecycle Timeline
3
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
Patch Released
Jan 27, 2026 - 19:15 nvd
Patch available
CVE Published
Jan 07, 2026 - 12:17 nvd
HIGH 7.8
Tags
Memory Corruption
Snapdragon Ar1 Gen 1 Platform Firmware
Wcd9395 Firmware
Wcn3950 Firmware
Wcn7750 Firmware
Wcd9380 Firmware
Video Collaboration Vc3 Platform Firmware
Wsa8840 Firmware
Snapdragon 4 Gen 2 Mobile Platform Firmware
Wcn3980 Firmware
Wsa8815 Firmware
Wcn7881 Firmware
Wsa8830 Firmware
Fastconnect 6900 Firmware
Sxr2330p Firmware
Snapdragon 6 Gen 1 Mobile Platform Firmware
Wcd9378 Firmware
Sxr2350p Firmware
Qmp1000 Firmware
Sm6475 Firmware
Sm8750 Firmware
Fastconnect 6200 Firmware
Sw5100p Firmware
Wsa8832 Firmware
Wcn7860 Firmware
Sm8750p Firmware
Wcd9375 Firmware
Sw5100 Firmware
Wsa8845h Firmware
Wcn7861 Firmware
Wcd9385 Firmware
Sm8735 Firmware
Qcs610 Firmware
Wcn6755 Firmware
Wcn7880 Firmware
Wsa8810 Firmware
Wsa8845 Firmware
Fastconnect 6700 Firmware
Sm7435 Firmware
Wcd9370 Firmware
Fastconnect 7800 Firmware
Video Collaboration Vc1 Platform Firmware
Wsa8835 Firmware
Wcn3988 Firmware
Description
Memory corruption occurs when a secure application is launched on a device with insufficient memory.
Analysis
Memory corruption occurs when a secure application is launched on a device with insufficient memory. [CVSS 7.8 HIGH]
Technical Context
Affects Fastconnect 6200 Firmware. Memory corruption occurs when a secure application is launched on a device with insufficient memory.
Affected Products
Vendor: Qualcomm. Product: Fastconnect 6200 Firmware. Versions: up to -.
Remediation
A vendor patch is available — apply it immediately.
Priority Score
39
Low
Medium
High
Critical
KEV: 0
EPSS: +0.0
CVSS: +39
POC: 0
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).