CVE-2025-47397
HIGH
2026-02-02
[email protected]
7.8
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Lifecycle Timeline
3
Analysis Generated
Mar 12, 2026 - 22:01 vuln.today
Patch Released
Feb 11, 2026 - 19:35 nvd
Patch available
CVE Published
Feb 02, 2026 - 16:16 nvd
HIGH 7.8
Tags
Memory Corruption
Srv1h Firmware
Qcs4490 Firmware
Snapdragon 6 Gen 4 Mobile Firmware
Snapdragon Ar1 Gen 1 Firmware
Qcm6125 Firmware
Netrani Firmware
G2 Gen 1 Firmware
Sa7255p Firmware
Wcn3950 Firmware
Wsa8815 Firmware
Snapdragon 8 Gen 2 Mobile Firmware
Fastconnect 7800 Firmware
Wcn7880 Firmware
Snapdragon 685 4g Mobile Firmware
Snapdragon 4 Gen 1 Mobile Firmware
Wsa8845h Firmware
Wsa8835 Firmware
Ssg2115p Firmware
Sm8475p Firmware
Snapdragon 662 Mobile Firmware
Wsa8845 Firmware
Qam8255p Firmware
G1 Gen 1 Firmware
Qca6391 Firmware
Snapdragon 680 4g Mobile Firmware
Qamsrv1m Firmware
Orne Firmware
Robotics Rb5 Firmware
Sm6225p Firmware
Wcd9378 Firmware
Sa8195p Firmware
Lemans Au Lgit Firmware
Qca6595 Firmware
Sxr1230p Firmware
Wcn7881 Firmware
Snapdragon 480 5g Mobile Firmware
Sa9000p Firmware
Qcn9011 Firmware
Snapdragon 7 Gen 1 Mobile Firmware
Sm7675 Firmware
Wsa8832 Firmware
Iq 615 Firmware
Sm7635p Firmware
Qca6797aq Firmware
Qcm6490 Firmware
Qcn9012 Firmware
Qcs2290 Firmware
Wsa8840 Firmware
Wcn7861 Firmware
Sm7550p Firmware
Csra6620 Firmware
Iq 9075 Firmware
Qca6574au Firmware
Qam8295p Firmware
Ssg2125p Firmware
Iq 8275 Firmware
Qcm4325 Firmware
Snapdragon 4 Gen 2 Mobile Firmware
Wcd9370 Firmware
Qca6698au Firmware
Snapdragon 8 Elite Firmware
Wcd9390 Firmware
Wcd9395 Firmware
Sm6650p Firmware
Qca6698aq Firmware
Qamsrv1h Firmware
Wcn6755 Firmware
Lemansau Firmware
Qrb5165n Firmware
Qca8695au Firmware
Sa8620p Firmware
Qca6678aq Firmware
Qcm2290 Firmware
Video Collaboration Vc3 Firmware
Sm8650q Firmware
Sxr2350p Firmware
Sm7675p Firmware
Sxr2330p Firmware
Wcd9335 Firmware
Sw5100p Firmware
Wcn3980 Firmware
Sm8750p Firmware
Snapdragon 6 Gen 1 Mobile Firmware
Srv1m Firmware
Sa8255p Firmware
Csra6640 Firmware
Sm8550p Firmware
Fastconnect 6900 Firmware
Snapdragon 6 Gen 3 Mobile Firmware
Snapdragon 8 Gen 1 Mobile Firmware
Qca6688aq Firmware
Iq 8300 Firmware
Sa7775p Firmware
Wsa8830 Firmware
Sa8770p Firmware
Iq 9100 Firmware
Fastconnect 6200 Firmware
Sm8635p Firmware
Video Collaboration Vc5 Firmware
Sa8155p Firmware
Sm8635 Firmware
Snapdragon 7s Gen 3 Mobile Firmware
Wcd9380 Firmware
Sxr2230p Firmware
Sd 8 Gen1 5g Firmware
Qcs8550 Firmware
Monaco Iot Firmware
Qcm5430 Firmware
Sw5100 Firmware
Fastconnect 6700 Firmware
Sm7435 Firmware
Snapdragon 8 Gen 3 Mobile Firmware
Flight Rb5 5g Firmware
Wsa8810 Firmware
Palawan25 Firmware
Ar8031 Firmware
Qca6574a Firmware
Wcn3988 Firmware
Qca6595au Firmware
Snapdragon 460 Mobile Firmware
Wcn7860 Firmware
Video Collaboration Vc1 Firmware
Sd662 Firmware
Sar2130p Firmware
Sxr2250p Firmware
Smart Audio 400 Firmware
Snapdragon 695 5g Mobile Firmware
Milos Firmware
Sm7550 Firmware
Wcn6650 Firmware
Qca6574 Firmware
Qca2066 Firmware
Wcd9385 Firmware
Qcm4490 Firmware
Wcn3910 Firmware
Wcd9371 Firmware
Qmp1000 Firmware
Sa8295p Firmware
Wcd9375 Firmware
Sa6155p Firmware
Qca6696 Firmware
Qcs4290 Firmware
Description
Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.
Analysis
Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors. [CVSS 7.8 HIGH]
Technical Context
Classified as CWE-401 (Memory Leak). Affects Ar8031 Firmware. Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.
Affected Products
Vendor: Qualcomm. Product: Ar8031 Firmware. Versions: up to -.
Remediation
A vendor patch is available — apply it immediately.
Priority Score
39
Low
Medium
High
Critical
KEV: 0
EPSS: +0.0
CVSS: +39
POC: 0
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).