Vulnerability identifier: #VU107101
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21439
CWE-ID:
CWE-787
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
FastConnect 6700
Mobile applications /
Mobile firmware & hardware
FastConnect 6900
Mobile applications /
Mobile firmware & hardware
QCA6595AU
Mobile applications /
Mobile firmware & hardware
QCM5430
Mobile applications /
Mobile firmware & hardware
QCM6490
Mobile applications /
Mobile firmware & hardware
QCN7606
Mobile applications /
Mobile firmware & hardware
QCS5430
Mobile applications /
Mobile firmware & hardware
QCS6490
Mobile applications /
Mobile firmware & hardware
Qualcomm® Video Collaboration VC3 Platform
Mobile applications /
Mobile firmware & hardware
SC8180X+SDX55
Mobile applications /
Mobile firmware & hardware
Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite"
Mobile applications /
Mobile firmware & hardware
Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite"
Mobile applications /
Mobile firmware & hardware
Snapdragon 8cx Compute Platform (SC8180X-AA
Mobile applications /
Mobile firmware & hardware
AB)
Mobile applications /
Mobile firmware & hardware
Snapdragon 8cx Compute Platform (SC8180XP-AC
Mobile applications /
Mobile firmware & hardware
AF) "Poipu Pro"
Mobile applications /
Mobile firmware & hardware
Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC
Mobile applications /
Mobile firmware & hardware
Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA
Mobile applications /
Mobile firmware & hardware
WCD9370
Mobile applications /
Mobile firmware & hardware
WCD9375
Mobile applications /
Mobile firmware & hardware
WCD9380
Mobile applications /
Mobile firmware & hardware
WCD9385
Mobile applications /
Mobile firmware & hardware
QCN7605
Hardware solutions /
Firmware
Vendor: Qualcomm
Description
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Windows WLAN Host. A local application can execute arbitrary code.
Mitigation
Install security update from vendor's website.
Vulnerable software versions
FastConnect 6700: All versions
FastConnect 6900: All versions
QCA6595AU: All versions
QCM5430: All versions
QCM6490: All versions
QCN7605: All versions
QCN7606: All versions
QCS5430: All versions
QCS6490: All versions
Qualcomm® Video Collaboration VC3 Platform: All versions
SC8180X+SDX55: All versions
Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite": All versions
Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite": All versions
Snapdragon 8cx Compute Platform (SC8180X-AA: All versions
AB): All versions
Snapdragon 8cx Compute Platform (SC8180XP-AC: All versions
AF) "Poipu Pro": All versions
Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC: All versions
Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA: All versions
WCD9370: All versions
WCD9375: All versions
WCD9380: All versions
WCD9385: All versions
External links
https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.