Airborne Toxic Event: The MediaTek WLAN Heap Overflow (CVE-2026-20408)
Vulnerability ID: CVE-2026-20408
CVSS Score: 8.8
Published: 2026-02-02
CVE-2026-20408 is a critical heap-based buffer overflow in the MediaTek WLAN SDK that allows adjacent attackers to execute arbitrary code with kernel privileges. Affecting a wide range of devices from OpenWrt routers to enterprise Aruba access points, this 'zero-click' vulnerability resides in the handling of wireless management frames. By broadcasting a malformed packet, an attacker can corrupt heap memory, bypass security mechanisms, and gain full control over the device without any user interaction.
TL;DR
A critical zero-click RCE in MediaTek Wi-Fi drivers allows attackers within radio range to compromise devices via malformed packets. Affects OpenWrt, Aruba, and generic MediaTek SDK implementations.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-787 (OOB Write)
- Attack Vector: Adjacent (AV:A)
- CVSS Score: 8.8 (High)
- Privileges: Kernel / Ring 0
- Impact: RCE / Denial of Service
- Exploit Status: PoC Expected
Affected Systems
- MediaTek SDK (Release 7.6.7.2 and prior)
- OpenWrt (Versions 19.07, 21.02, 23.05)
- Aruba Networks APs (Specific models with MediaTek chips)
- Ubiquiti/Other vendors using MT7915/MT7986 chipsets
-
MediaTek SDK: <= 7.6.7.2 (Fixed in:
Post-Feb 2026 Release) -
OpenWrt: 19.07 - 23.05 (Fixed in:
Snapshot Feb 2026)
Code Analysis
Commit: WCNCR00
MediaTek Internal Patch ID for Heap Buffer Overflow Fix
N/A (Proprietary/Internal)
Exploit Details
- Tencent Cloud Analysis: Theoretical analysis of MediaTek/Aruba heap overflow impact
Mitigation Strategies
- Update firmware to versions including Patch ID WCNCR00461651
- Isolate Wi-Fi management interfaces from public access
- Monitor for kernel panics or repeated Wi-Fi driver crashes
Remediation Steps:
- Identify all devices using MediaTek MT79xx/MT76xx chipsets.
- For OpenWrt: Run 'opkg update; opkg upgrade mt76-firmware kmod-mt76'.
- For Enterprise APs: Apply the February 2026 Vendor Security Patch immediately.
- Reboot devices to load the patched kernel modules.
References
Read the full report for CVE-2026-20408 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)