7.5
HIGH CVSS 3.1
CVE-2025-47328
Buffer Over-read in WLAN HAL
Description

Transient DOS while processing power control requests with invalid antenna or stream values.

INFO

Published Date :

Sept. 24, 2025, 4:15 p.m.

Last Modified :

Sept. 25, 2025, 4:01 p.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2025-47328 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm wsa8830_firmware
2 Qualcomm wsa8835_firmware
3 Qualcomm ipq9008_firmware
4 Qualcomm ipq9574_firmware
5 Qualcomm qca8075_firmware
6 Qualcomm qca8081_firmware
7 Qualcomm qca8082_firmware
8 Qualcomm qca8084_firmware
9 Qualcomm qca8085_firmware
10 Qualcomm qca8386_firmware
11 Qualcomm qcn5124_firmware
12 Qualcomm qcn9000_firmware
13 Qualcomm qcn9012_firmware
14 Qualcomm qcn9024_firmware
15 Qualcomm qcn9074_firmware
16 Qualcomm qcn9274_firmware
17 Qualcomm wcd9340_firmware
18 Qualcomm wsa8832_firmware
19 Qualcomm fastconnect_7800_firmware
20 Qualcomm qca0000_firmware
21 Qualcomm qcc710_firmware
22 Qualcomm immersive_home_3210_platform_firmware
23 Qualcomm immersive_home_326_platform_firmware
24 Qualcomm ipq9554_firmware
25 Qualcomm ipq9570_firmware
26 Qualcomm wcd9395_firmware
27 Qualcomm wsa8840_firmware
28 Qualcomm wsa8845_firmware
29 Qualcomm wsa8845h_firmware
30 Qualcomm ipq5332_firmware
31 Qualcomm qcf8001_firmware
32 Qualcomm qcn6224_firmware
33 Qualcomm qcn6274_firmware
34 Qualcomm qfw7114_firmware
35 Qualcomm qfw7124_firmware
36 Qualcomm snapdragon_x75_5g_modem-rf_system_firmware
37 Qualcomm wcd9340
38 Qualcomm wsa8830
39 Qualcomm wsa8835
40 Qualcomm qca8075
41 Qualcomm qca8081
42 Qualcomm qcn5124
43 Qualcomm qcn9000
44 Qualcomm qcn9074
45 Qualcomm qca0000
46 Qualcomm qcn9012
47 Qualcomm qcn9024
48 Qualcomm qcf8000_firmware
49 Qualcomm ipq5302_firmware
50 Qualcomm ipq5312_firmware
51 Qualcomm qcn6402_firmware
52 Qualcomm qcn6412_firmware
53 Qualcomm qcn6422_firmware
54 Qualcomm qcn6432_firmware
55 Qualcomm fastconnect_7800
56 Qualcomm qcc710
57 Qualcomm qcn6224
58 Qualcomm qcn6274
59 Qualcomm qfw7114
60 Qualcomm qfw7124
61 Qualcomm snapdragon_x75_5g_modem-rf_system
62 Qualcomm wcd9395
63 Qualcomm wsa8832
64 Qualcomm wsa8840
65 Qualcomm wsa8845
66 Qualcomm wsa8845h
67 Qualcomm immersive_home_3210_platform
68 Qualcomm immersive_home_326_platform
69 Qualcomm ipq5332
70 Qualcomm ipq9008
71 Qualcomm ipq9554
72 Qualcomm ipq9570
73 Qualcomm ipq9574
74 Qualcomm qca8082
75 Qualcomm qca8084
76 Qualcomm qca8085
77 Qualcomm qca8386
78 Qualcomm qcf8000
79 Qualcomm qcf8001
80 Qualcomm qcn9274
81 Qualcomm ipq5302
82 Qualcomm ipq5312
83 Qualcomm qcn6402
84 Qualcomm qcn6412
85 Qualcomm qcn6422
86 Qualcomm qcn6432
87 Qualcomm ipq5300_firmware
88 Qualcomm ipq5300
89 Qualcomm snapdragon_x72_5g_modem-rf_system_firmware
90 Qualcomm snapdragon_x72_5g_modem-rf_system
91 Qualcomm sm8750_firmware
92 Qualcomm sm8750
93 Qualcomm qcn9160_firmware
94 Qualcomm qcn9160
95 Qualcomm qxm8083_firmware
96 Qualcomm qxm8083
97 Qualcomm wcd9378_firmware
98 Qualcomm wcd9378
99 Qualcomm wcn7880_firmware
100 Qualcomm wcn7880
101 Qualcomm wcn7881_firmware
102 Qualcomm wcn7881
103 Qualcomm wcn7861_firmware
104 Qualcomm wcn7861
105 Qualcomm wcn7860_firmware
106 Qualcomm wcn7860
107 Qualcomm sm8750p_firmware
108 Qualcomm sm8750p
109 Qualcomm ipq9048_firmware
110 Qualcomm ipq9048
111 Qualcomm sm8735_firmware
112 Qualcomm sm8735
113 Qualcomm qmp1000_firmware
114 Qualcomm qmp1000
115 Qualcomm wcn7750_firmware
116 Qualcomm wcn7750
117 Qualcomm ipq5424_firmware
118 Qualcomm ipq5424
119 Qualcomm qca8080_firmware
120 Qualcomm qca8080
121 Qualcomm qca8101_firmware
122 Qualcomm qca8101
123 Qualcomm qca8384_firmware
124 Qualcomm qca8384
125 Qualcomm qca8385_firmware
126 Qualcomm qca8385
127 Qualcomm qcn5224_firmware
128 Qualcomm qcn5224
129 Qualcomm qca8102_firmware
130 Qualcomm qca8102
131 Qualcomm qca8111_firmware
132 Qualcomm qca8111
133 Qualcomm qca8112_firmware
134 Qualcomm qca8112
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH 2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
CVSS 3.1 HIGH [email protected]
Solution
Fix by validating antenna and stream values in power control requests.
  • Validate antenna and stream values.
  • Sanitize inputs for power control requests.
  • Implement robust error handling for invalid inputs.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-47328.

URL Resource
https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2025-bulletin.html Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-47328 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-47328 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-47328 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-47328 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Sep. 25, 2025

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5300_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5302:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5312:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5424_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5424:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9048_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9048:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9570:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8080_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8080:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8101_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8101:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8102_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8102:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8111_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8111:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8112_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8112:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8384_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8384:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5224_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5224:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6402_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6402:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6412_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6412:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6422_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6422:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6432_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6432:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9160_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9160:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qmp1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm8083_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm8083:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8735:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7750_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7860:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7861:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7881:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*
    Added Reference Type Qualcomm, Inc.: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2025-bulletin.html Types: Vendor Advisory
  • New CVE Received by [email protected]

    Sep. 24, 2025

    Action Type Old Value New Value
    Added Description Transient DOS while processing power control requests with invalid antenna or stream values.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    Added CWE CWE-126
    Added Reference https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2025-bulletin.html
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 7.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact