CVE Alert: CVE-2025-47326 – Qualcomm, Inc. – Snapdragon

CVE-2025-47326

HIGHNo exploitation known

Transient DOS while handling command data during power control processing.

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
AR8035 | CSR8811 | FastConnect 6900 | FastConnect 7800 | Immersive Home 214 Platform | Immersive Home 216 Platform | Immersive Home 316 Platform | Immersive Home 318 Platform | Immersive Home 3210 Platform | Immersive Home 326 Platform | IPQ5010 | IPQ5028 | IPQ5300 | IPQ5302 | IPQ5312 | IPQ5332 | IPQ5424 | IPQ6000 | IPQ6010 | IPQ6018 | IPQ6028 | IPQ8070A | IPQ8071A | IPQ8072A | IPQ8074A | IPQ8076 | IPQ8076A | IPQ8078 | IPQ8078A | IPQ8173 | IPQ8174 | IPQ9008 | IPQ9048 | IPQ9554 | IPQ9570 | IPQ9574 | QCA0000 | QCA4024 | QCA8075 | QCA8080 | QCA8081 | QCA8082 | QCA8084 | QCA8085 | QCA8101 | QCA8102 | QCA8111 | QCA8112 | QCA8337 | QCA8384 | QCA8385 | QCA8386 | QCA9888 | QCA9889 | QCC710 | QCF8000 | QCF8000SFP | QCF8001 | QCN5022 | QCN5024 | QCN5052 | QCN5122 | QCN5124 | QCN5152 | QCN5154 | QCN5164 | QCN5224 | QCN6023 | QCN6024 | QCN6112 | QCN6122 | QCN6132 | QCN6224 | QCN6274 | QCN6402 | QCN6412 | QCN6422 | QCN6432 | QCN9000 | QCN9012 | QCN9022 | QCN9024 | QCN9070 | QCN9072 | QCN9074 | QCN9100 | QCN9160 | QCN9274 | QFW7114 | QFW7124 | QMP1000 | QXM8083 | SDX55 | SDX65M | SM6650 | SM6650P | SM7635 | SM7635P | SM8735 | SM8750 | SM8750P | Snapdragon X65 5G Modem-RF System | Snapdragon X72 5G Modem-RF System | Snapdragon X75 5G Modem-RF System | SW-only | WCD9340 | WCD9378 | WCD9395 | WCN6650 | WCN6755 | WCN7750 | WCN7860 | WCN7861 | WCN7880 | WCN7881 | WSA8830 | WSA8832 | WSA8835 | WSA8840 | WSA8845 | WSA8845H
CWE
CWE-126, CWE-126 Buffer Over-read
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published
2025-09-24T15:33:52.473Z
Updated
2025-09-24T15:33:52.473Z

AI Summary Analysis

Risk verdict

High risk of remote denial-of-service via the WLAN subsystem, with no user interaction or privileges required; urgency depends on exploitation activity not currently confirmed in KEV/EPSS data.

Why this matters

A transient DoS on the WLAN stack can disable network connectivity for numerous devices in business and consumer deployments, leading to degraded communications, disrupted IoT operations, and potential impact on critical services relying on wireless access.

Most likely attack path

An attacker on the same network can trigger the vulnerability by sending crafted command data to the WLAN handling component, exploiting network access with no authentication. The impact is a DoS during power-control processing, described as transient and primarily affecting availability.

Who is most exposed

Devices using Qualcomm-supplied WLAN IP across mobile, industrial IoT, and embedded networking platforms are at risk, including smartphones, IoT gateways, and enterprise access devices that rely on the affected HAL in real deployments.

Detection ideas

  • Spikes in WLAN outages or device reboots linked to wireless activity
  • Logs showing WLAN HAL crashes or watchdog resets during connectivity events
  • Unusual power-management or command-processing thread activity around wireless events
  • Anomalous traffic patterns or command data sequences hitting the WLAN path

Mitigation and prioritisation

  • Apply the latest firmware/driver update from the vendor; treat as high priority when patch becomes available
  • Implement network segmentation and rate-limiting to limit exposure of WLAN services
  • Monitor for DoS-like signals and establish alerting on WLAN HAL instability
  • Validate changes in a lab before deployment and schedule patching during a maintenance window
  • Contingency: have alternative connectivity paths or disable affected features if feasible

Note: If KEV is true or EPSS ≥ 0.5, treat as priority 1. Data not provided in this instance.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.