In wlan AP/STA firmware, there is a possible system becoming irresponsive due to an uncaught exception. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00461663 / WCNCR00463309; Issue ID: MSV-4852.
References
| Link | Resource |
|---|---|
| https://corp.mediatek.com/product-security-bulletin/February-2026 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
03 Feb 2026, 21:27
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://corp.mediatek.com/product-security-bulletin/February-2026 - Vendor Advisory | |
| First Time |
Mediatek mt6890
Mediatek mt8775 Mediatek mt7922 Mediatek software Development Kit Openwrt openwrt Mediatek mt8883 Mediatek mt8893 Mediatek mt7902 Mediatek mt7927 Mediatek mt8910 Mediatek nbiot Sdk Mediatek mt8196 Mediatek Mediatek mt7920 Mediatek mt8678 Mediatek mt8676 Openwrt Mediatek mt7916 Mediatek mt8796 Mediatek mt7925 Mediatek mt8873 Mediatek mt7915 Mediatek mt7986 Mediatek mt7921 Mediatek mt8793 Mediatek mt7981 Mediatek mt8791t Mediatek mt8792 Mediatek mt8668 Mediatek mt6989tb |
|
| CPE | cpe:2.3:a:mediatek:nbiot_sdk:*:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8873:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989tb:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8793:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:* cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8883:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8910:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8668:-:*:*:*:*:*:*:* |
Information
Published : 2026-02-02 09:15
Updated : 2026-02-03 21:27
NVD link : CVE-2026-20419
Mitre link : CVE-2026-20419
CVE.ORG link : CVE-2026-20419
JSON object : View
Products Affected
mediatek
- mt8893
- mt8792
- mt6890
- mt7921
- mt7981
- mt8196
- software_development_kit
- mt7986
- mt7915
- nbiot_sdk
- mt8910
- mt7922
- mt7927
- mt8791t
- mt8668
- mt8775
- mt8873
- mt7925
- mt8793
- mt7916
- mt7902
- mt7920
- mt8796
- mt6989tb
- mt8678
- mt8883
- mt8676
openwrt
- openwrt
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions
