CVE-2025-47391
Published: 06 April 2026
Summary
CVE-2025-47391 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Qualcomm Wcn3988 Firmware. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the memory corruption flaw by identifying, patching, and applying vendor-provided updates for the affected Qualcomm components.
Implements memory protection safeguards like address space layout randomization and data execution prevention to mitigate stack-based buffer overflow exploitation.
Validates user-supplied frame requests to ensure they are within acceptable bounds, preventing the malformed inputs that trigger the buffer overflow.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local stack-based buffer overflow in Qualcomm component directly enables privilege escalation via crafted frame request from low-priv user context.
NVD Description
Memory corruption while processing a frame request from user.
Deeper analysisAI
CVE-2025-47391 is a memory corruption vulnerability, classified under CWE-121 (stack-based buffer overflow), that occurs while processing a frame request from a user. It affects components in Qualcomm products, as detailed in the vendor's security bulletin. The vulnerability received a CVSS v3.1 base score of 7.8 (High), reflecting local vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). It was published on April 6, 2026.
A local attacker with low privileges can exploit this vulnerability by sending a specially crafted frame request to the affected component, triggering memory corruption. Successful exploitation could allow the attacker to gain high-level impacts, including unauthorized disclosure of sensitive information, modification of data, and denial of service, potentially compromising the system's security.
Qualcomm's April 2026 security bulletin provides details on mitigation, including available patches and recommended updates for affected products. Security practitioners should consult the advisory at https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html for specific remediation steps and verification guidance.
Details
- CWE(s)