{"id":11826,"date":"2024-09-26T13:09:52","date_gmt":"2024-09-26T07:39:52","guid":{"rendered":"https:\/\/reconcybersecurity.com\/blogs\/?post_type=web-story&#038;p=11826"},"modified":"2024-09-26T13:09:58","modified_gmt":"2024-09-26T07:39:58","slug":"understanding-0-click-rce-vulnerability-in-mediatek-wi-fi-chipsets","status":"publish","type":"web-story","link":"https:\/\/reconcybersecurity.com\/blogs\/web-stories\/understanding-0-click-rce-vulnerability-in-mediatek-wi-fi-chipsets\/","title":{"rendered":"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets"},"content":{"rendered":"<p><html amp=\"\" lang=\"en\"><head><meta charSet=\"utf-8\"\/><meta name=\"viewport\" content=\"width=device-width,minimum-scale=1,initial-scale=1\"\/><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0.js\"><\/script><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0\/amp-story-1.0.js\" custom-element=\"amp-story\"><\/script><link href=\"https:\/\/fonts.googleapis.com\/css2?display=swap&amp;family=Oswald\" rel=\"stylesheet\"\/><link href=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png\" rel=\"preload\" as=\"image\"\/>\n<style amp-boilerplate=\"\">body{-webkit-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-moz-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-ms-animation:-amp-start 8s steps(1,end) 0s 1 normal both;animation:-amp-start 8s steps(1,end) 0s 1 normal both}@-webkit-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-moz-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-ms-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-o-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}<\/style>\n<p><noscript><\/p>\n<style amp-boilerplate=\"\">body{-webkit-animation:none;-moz-animation:none;-ms-animation:none;animation:none}<\/style>\n<p><\/noscript><\/p>\n<style amp-custom=\"\">\n              h1, h2, h3 { font-weight: normal; }<\/p>\n<p>              amp-story-page {\n                background-color: #131516;\n              }<\/p>\n<p>              amp-story-grid-layer {\n                overflow: visible;\n              }<\/p>\n<p>              @media (max-aspect-ratio: 9 \/ 16)  {\n                @media (min-aspect-ratio: 320 \/ 678) {\n                  amp-story-grid-layer.grid-layer {\n                    margin-top: calc((100% \/ 0.5625 - 100% \/ 0.6666666666666666) \/ 2);\n                  }\n                }\n              }<\/p>\n<p>              @media not all and (min-resolution:.001dpcm) {\n                @media {\n                  p.text-wrapper > span {\n                    font-size: calc(100% - 0.5px);\n                  }\n                }\n              }<\/p>\n<p>              .page-fullbleed-area,\n              .page-background-overlay-area {\n                position: absolute;\n                overflow: hidden;\n                width: 100%;\n                left: 0;\n                height: calc(1.1851851851851851 * 100%);\n                top: calc((1 - 1.1851851851851851) * 100% \/ 2);\n              }<\/p>\n<p>              .element-overlay-area {\n                position: absolute;\n                width: 100%;\n                height: 100%;\n                top: 0;\n                left: 0;\n              }<\/p>\n<p>              .page-safe-area {\n                overflow: visible;\n                position: absolute;\n                top: 0;\n                bottom: 0;\n                left: 0;\n                right: 0;\n                width: 100%;\n                height: calc(0.84375 * 100%);\n                margin: auto 0;\n              }<\/p>\n<p>              .mask {\n                position: absolute;\n                overflow: hidden;\n              }<\/p>\n<p>              .fill {\n                position: absolute;\n                top: 0;\n                left: 0;\n                right: 0;\n                bottom: 0;\n                margin: 0;\n              }<\/p>\n<p>              @media (prefers-reduced-motion: no-preference) {\n                .animation-wrapper {\n                  opacity: var(--initial-opacity);\n                  transform: var(--initial-transform);\n                }\n              }<\/p>\n<p>              amp-story-grid-layer.align-bottom {\n                align-content: end;\n                padding: 0;\n                \/*\n                  AMP CTA Layer will exactly occupy 74px regardless of any device.\n                  To space out captions 74px from the BOTTOM (AMP CTA Layer),\n                  74px from the TOP should also be spaced out and thus: 2 * 74px\n                  will be the desired max-height.\n                *\/\n                max-height: calc(100vh - (2 * 74px));\n              }<\/p>\n<p>              .captions-area {\n                padding: 0 32px 0;\n              }<\/p>\n<p>              amp-story-captions {\n                margin-bottom: 16px;\n                text-align: center;\n              }<\/p>\n<p>              amp-story-audio-sticker {\n                height: 100%;\n              }<\/p>\n<p>              .audio-sticker {\n                font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\n              }\n              <\/style>\n<p><meta name=\"web-stories-replace-head-start\"\/><title>Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets<\/title><link rel=\"canonical\" href=\"https:\/\/reconcybersecurity.com\/blogs\/web-stories\/understanding-0-click-rce-vulnerability-in-mediatek-wi-fi-chipsets\/\"\/><meta name=\"web-stories-replace-head-end\"\/><\/head><body><amp-story standalone=\"\" publisher=\"Recon Cyber security\" publisher-logo-src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Recon-Cyber-Security.jpeg\" title=\"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets\" poster-portrait-src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/cropped-Black-and-Green-Texture-Instagram-Reels-Cover.png\"><amp-story-page id=\"9cde1350-3c77-4fe2-9d65-e3e10101bb9a\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#63b0da\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-8082aaae-4f9b-46ea-987b-2cd48e4e60b6\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png\" alt=\"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png 1080w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png 864w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png 576w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png 169w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png 150w\" sizes=\"(min-width: 1024px) 45vh, 100vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:4.12621%;top:78.80259%;width:91.74757%;height:25.24272%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" id=\"el-dcfdeaec-acec-4b07-8712-b88aba5f354a\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/0-click-vulnerability-mediatek-wi-fi\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/0-Click-RCE-Vulnerability-in-MediaTek-Wi-Fi-Chipsets.webp\" data-tooltip-text=\"the 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<h1 id=\"understanding-0-click-rce-vulnerability-in-mediatek-wi-fi-chipsets\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:2.122222222222222% 0;font-family:&quot;Oswald&quot;,sans-serif;font-size:0.679612em;line-height:1.1;text-align:center;padding:0;color:#000000\"><span><span style=\"color: #fff\">Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets<\/span><\/span><\/h1>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"becf4f57-16fc-4b2b-bbcf-38302babb0e2\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#63b0da\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-0edef313-57d6-4805-8564-d65f5d62e915\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png\" alt=\"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png 1080w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png 864w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png 576w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png 169w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png 150w\" sizes=\"(min-width: 1024px) 45vh, 100vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:4.12621%;top:82.52427%;width:91.74757%;height:17.47573%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" id=\"el-e36d5a16-b497-403e-9925-be04d410b4dc\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/0-click-vulnerability-mediatek-wi-fi\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/0-Click-RCE-Vulnerability-in-MediaTek-Wi-Fi-Chipsets.webp\" data-tooltip-text=\"the 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<h1 id=\"what-is-a-0-click-rce-vulnerability\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:2.122222222222222% 0;font-family:&quot;Oswald&quot;,sans-serif;font-size:0.679612em;line-height:1.1;text-align:center;padding:0;color:#000000\"><span><span style=\"color: #fff\">What Is a 0-Click RCE Vulnerability?<\/span><\/span><\/h1>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"fc7ba23f-d1df-4390-a4da-777b815086f7\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#63b0da\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-b0d28204-9175-4e86-87a1-bc4b3f11b462\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png\" alt=\"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png 1080w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png 864w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png 576w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png 169w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png 150w\" sizes=\"(min-width: 1024px) 45vh, 100vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:4.12621%;top:82.03883%;width:91.74757%;height:17.47573%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" id=\"el-b8b70fe3-77d2-459b-abcd-bc0428fdac8d\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/0-click-vulnerability-mediatek-wi-fi\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/0-Click-RCE-Vulnerability-in-MediaTek-Wi-Fi-Chipsets.webp\" data-tooltip-text=\"the 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<h1 id=\"how-mediatek-wi-fi-chipsets-are-affected\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:2.122222222222222% 0;font-family:&quot;Oswald&quot;,sans-serif;font-size:0.679612em;line-height:1.1;text-align:center;padding:0;color:#000000\"><span><span style=\"color: #fff\">How MediaTek Wi-Fi Chipsets Are Affected<\/span><\/span><\/h1>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"4668008f-9154-462d-b811-2a00b12b05e4\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#63b0da\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-0c9f991b-996d-40ae-9b0b-129e0395d223\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png\" alt=\"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png 1080w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png 864w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png 576w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png 169w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png 150w\" sizes=\"(min-width: 1024px) 45vh, 100vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:4.12621%;top:82.52427%;width:91.74757%;height:17.47573%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" id=\"el-6031b35c-1ea0-483d-b7e3-380e7a38d1a7\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/0-click-vulnerability-mediatek-wi-fi\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/0-Click-RCE-Vulnerability-in-MediaTek-Wi-Fi-Chipsets.webp\" data-tooltip-text=\"the 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<h1 id=\"potential-risks-and-implications-for-users\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:2.122222222222222% 0;font-family:&quot;Oswald&quot;,sans-serif;font-size:0.679612em;line-height:1.1;text-align:center;padding:0;color:#000000\"><span><span style=\"color: #fff\">Potential Risks and Implications for Users<\/span><\/span><\/h1>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"a4eea127-c889-41ec-a149-f8dd4ad8032d\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#63b0da\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-4d1810a0-3042-43c9-851d-616380fbc92b\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png\" alt=\"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png 1080w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png 864w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png 576w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png 169w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png 150w\" sizes=\"(min-width: 1024px) 45vh, 100vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:4.12621%;top:80.2589%;width:84.95146%;height:25.24272%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" id=\"el-4e8eb314-8b5d-4835-a0d4-765dbb971a89\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/0-click-vulnerability-mediatek-wi-fi\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/0-Click-RCE-Vulnerability-in-MediaTek-Wi-Fi-Chipsets.webp\" data-tooltip-text=\"the 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<h1 id=\"steps-taken-by-mediatek-to-address-the-vulnerability\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:2.292% 0;font-family:&quot;Oswald&quot;,sans-serif;font-size:0.679612em;line-height:1.1;text-align:center;padding:0;color:#000000\"><span><span style=\"color: #fff\">Steps Taken by MediaTek to Address the Vulnerability<\/span><\/span><\/h1>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><\/amp-story><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"Learn about the 0-Click RCE vulnerability in MediaTek Wi-Fi chipsets, how it affects millions of devices, and the critical steps for protection. Explore top cyber security courses in Delhi to enhance \n","protected":false},"author":1,"featured_media":11828,"template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"web_stories_publisher_logo":11731,"web_stories_poster":[],"web_stories_products":[],"footnotes":""},"web_story_category":[],"web_story_tag":[2555,2557,2551,2574,2568,2366,2375,2370,2369,2373,2407,2367,2550,2411,2561,2563,2562,2571,2570,2569,2556,2565,2559,2564,2558,2566,2547,2368,2371,2572,2374,2553,2552,2554,2548,2573,2560,2549,2567],"class_list":["post-11826","web-story","type-web-story","status-publish","has-post-thumbnail"],"story_data":{"version":47,"pages":[{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png","width":169,"height":300,"filesize":37359,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png"},"large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png","width":576,"height":1024,"filesize":261514,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png"},"thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-150x150.png","width":150,"height":150,"filesize":25794,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x150.png"},"medium_large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png","width":768,"height":1365,"filesize":402021,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png"},"1536x1536":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png","width":864,"height":1536,"filesize":478467,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png"},"cnvs-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"cnvs-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png","width":300,"height":225,"filesize":65567,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png"},"pk-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"pk-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png","width":300,"height":225,"filesize":65567,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png"},"csco-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"csco-intermediate":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-200x140.png","width":200,"height":140,"filesize":31880,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-200x140.png"},"csco-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-380x220.png","width":380,"height":220,"filesize":75283,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x220.png"},"csco-thumbnail-alternative":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x180.png","width":300,"height":180,"filesize":53343,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x180.png"},"csco-thumbnail-uncropped":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png","width":380,"height":676,"filesize":137758,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png"},"csco-medium":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-800x500.png","width":800,"height":500,"filesize":256376,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x500.png"},"csco-medium-alternative":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-560x336.png","width":560,"height":336,"filesize":142474,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-560x336.png"},"csco-medium-uncropped":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png","width":800,"height":1422,"filesize":427568,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png"},"csco-large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-1080x680.png","width":1080,"height":680,"filesize":399538,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-1080x680.png"},"csco-extra-large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-1080x1024.png","width":1080,"height":1024,"filesize":557647,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-1080x1024.png"},"web-stories-poster-portrait":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-640x853.png","width":640,"height":853,"filesize":298082,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-640x853.png"},"web-stories-publisher-logo":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-96x96.png","width":96,"height":96,"filesize":12207,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-96x96.png"},"web-stories-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png","width":150,"height":267,"filesize":31263,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png"},"full":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#63b0da","blurHash":"U73vgiozHqVryZozR3V?Hqj]yZfPHXV@yZo#","creationDate":1727335923000,"src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png","id":11827,"alt":"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets","local":false},"type":"image","x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"8082aaae-4f9b-46ea-987b-2cd48e4e60b6","isBackground":true,"isHidden":false},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Oswald"},"fontSize":42,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1,"textAlign":"center","padding":{"locked":true,"horizontal":0,"vertical":0},"type":"text","content":"<span style=\"color: #fff\">Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets<\/span>","marginOffset":-16.043999999999997,"x":17,"y":487,"width":378,"height":156,"tagName":"h1","id":"dcfdeaec-acec-4b07-8712-b88aba5f354a","link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/0-click-vulnerability-mediatek-wi-fi\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/0-Click-RCE-Vulnerability-in-MediaTek-Wi-Fi-Chipsets.webp","desc":"the 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"9cde1350-3c77-4fe2-9d65-e3e10101bb9a","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"7545661c-7389-442e-a6ad-f569291c56b5"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png","width":169,"height":300,"filesize":37359,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png"},"large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png","width":576,"height":1024,"filesize":261514,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png"},"thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-150x150.png","width":150,"height":150,"filesize":25794,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x150.png"},"medium_large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png","width":768,"height":1365,"filesize":402021,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png"},"1536x1536":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png","width":864,"height":1536,"filesize":478467,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png"},"cnvs-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"cnvs-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png","width":300,"height":225,"filesize":65567,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png"},"pk-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"pk-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png","width":300,"height":225,"filesize":65567,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png"},"csco-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"csco-intermediate":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-200x140.png","width":200,"height":140,"filesize":31880,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-200x140.png"},"csco-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-380x220.png","width":380,"height":220,"filesize":75283,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x220.png"},"csco-thumbnail-alternative":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x180.png","width":300,"height":180,"filesize":53343,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x180.png"},"csco-thumbnail-uncropped":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png","width":380,"height":676,"filesize":137758,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png"},"csco-medium":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-800x500.png","width":800,"height":500,"filesize":256376,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x500.png"},"csco-medium-alternative":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-560x336.png","width":560,"height":336,"filesize":142474,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-560x336.png"},"csco-medium-uncropped":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png","width":800,"height":1422,"filesize":427568,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png"},"csco-large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-1080x680.png","width":1080,"height":680,"filesize":399538,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-1080x680.png"},"csco-extra-large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-1080x1024.png","width":1080,"height":1024,"filesize":557647,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-1080x1024.png"},"web-stories-poster-portrait":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-640x853.png","width":640,"height":853,"filesize":298082,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-640x853.png"},"web-stories-publisher-logo":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-96x96.png","width":96,"height":96,"filesize":12207,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-96x96.png"},"web-stories-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png","width":150,"height":267,"filesize":31263,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png"},"full":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#63b0da","blurHash":"U73vgiozHqVryZozR3V?Hqj]yZfPHXV@yZo#","creationDate":1727335923000,"src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png","id":11827,"alt":"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets","local":false},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"0edef313-57d6-4805-8564-d65f5d62e915","isBackground":true,"isHidden":false,"type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Oswald"},"fontSize":42,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1,"textAlign":"center","padding":{"locked":true,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">What Is a 0-Click RCE Vulnerability?<\/span>","marginOffset":-16.043999999999997,"x":17,"y":510,"width":378,"height":108,"tagName":"h1","id":"e36d5a16-b497-403e-9925-be04d410b4dc","type":"text","link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/0-click-vulnerability-mediatek-wi-fi\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/0-Click-RCE-Vulnerability-in-MediaTek-Wi-Fi-Chipsets.webp","desc":"the 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"becf4f57-16fc-4b2b-bbcf-38302babb0e2","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"7545661c-7389-442e-a6ad-f569291c56b5"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png","width":169,"height":300,"filesize":37359,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png"},"large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png","width":576,"height":1024,"filesize":261514,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png"},"thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-150x150.png","width":150,"height":150,"filesize":25794,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x150.png"},"medium_large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png","width":768,"height":1365,"filesize":402021,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png"},"1536x1536":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png","width":864,"height":1536,"filesize":478467,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png"},"cnvs-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"cnvs-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png","width":300,"height":225,"filesize":65567,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png"},"pk-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"pk-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png","width":300,"height":225,"filesize":65567,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png"},"csco-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"csco-intermediate":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-200x140.png","width":200,"height":140,"filesize":31880,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-200x140.png"},"csco-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-380x220.png","width":380,"height":220,"filesize":75283,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x220.png"},"csco-thumbnail-alternative":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x180.png","width":300,"height":180,"filesize":53343,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x180.png"},"csco-thumbnail-uncropped":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png","width":380,"height":676,"filesize":137758,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png"},"csco-medium":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-800x500.png","width":800,"height":500,"filesize":256376,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x500.png"},"csco-medium-alternative":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-560x336.png","width":560,"height":336,"filesize":142474,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-560x336.png"},"csco-medium-uncropped":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png","width":800,"height":1422,"filesize":427568,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png"},"csco-large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-1080x680.png","width":1080,"height":680,"filesize":399538,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-1080x680.png"},"csco-extra-large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-1080x1024.png","width":1080,"height":1024,"filesize":557647,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-1080x1024.png"},"web-stories-poster-portrait":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-640x853.png","width":640,"height":853,"filesize":298082,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-640x853.png"},"web-stories-publisher-logo":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-96x96.png","width":96,"height":96,"filesize":12207,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-96x96.png"},"web-stories-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png","width":150,"height":267,"filesize":31263,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png"},"full":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#63b0da","blurHash":"U73vgiozHqVryZozR3V?Hqj]yZfPHXV@yZo#","creationDate":1727335923000,"src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png","id":11827,"alt":"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets","local":false},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"b0d28204-9175-4e86-87a1-bc4b3f11b462","isBackground":true,"isHidden":false,"type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Oswald"},"fontSize":42,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1,"textAlign":"center","padding":{"locked":true,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">How MediaTek Wi-Fi Chipsets Are Affected<\/span>","marginOffset":-16.043999999999997,"x":17,"y":507,"width":378,"height":108,"tagName":"h1","id":"b8b70fe3-77d2-459b-abcd-bc0428fdac8d","type":"text","link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/0-click-vulnerability-mediatek-wi-fi\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/0-Click-RCE-Vulnerability-in-MediaTek-Wi-Fi-Chipsets.webp","desc":"the 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"fc7ba23f-d1df-4390-a4da-777b815086f7","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"7545661c-7389-442e-a6ad-f569291c56b5"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png","width":169,"height":300,"filesize":37359,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png"},"large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png","width":576,"height":1024,"filesize":261514,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png"},"thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-150x150.png","width":150,"height":150,"filesize":25794,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x150.png"},"medium_large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png","width":768,"height":1365,"filesize":402021,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png"},"1536x1536":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png","width":864,"height":1536,"filesize":478467,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png"},"cnvs-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"cnvs-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png","width":300,"height":225,"filesize":65567,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png"},"pk-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"pk-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png","width":300,"height":225,"filesize":65567,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png"},"csco-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"csco-intermediate":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-200x140.png","width":200,"height":140,"filesize":31880,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-200x140.png"},"csco-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-380x220.png","width":380,"height":220,"filesize":75283,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x220.png"},"csco-thumbnail-alternative":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x180.png","width":300,"height":180,"filesize":53343,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x180.png"},"csco-thumbnail-uncropped":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png","width":380,"height":676,"filesize":137758,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png"},"csco-medium":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-800x500.png","width":800,"height":500,"filesize":256376,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x500.png"},"csco-medium-alternative":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-560x336.png","width":560,"height":336,"filesize":142474,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-560x336.png"},"csco-medium-uncropped":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png","width":800,"height":1422,"filesize":427568,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png"},"csco-large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-1080x680.png","width":1080,"height":680,"filesize":399538,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-1080x680.png"},"csco-extra-large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-1080x1024.png","width":1080,"height":1024,"filesize":557647,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-1080x1024.png"},"web-stories-poster-portrait":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-640x853.png","width":640,"height":853,"filesize":298082,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-640x853.png"},"web-stories-publisher-logo":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-96x96.png","width":96,"height":96,"filesize":12207,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-96x96.png"},"web-stories-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png","width":150,"height":267,"filesize":31263,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png"},"full":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#63b0da","blurHash":"U73vgiozHqVryZozR3V?Hqj]yZfPHXV@yZo#","creationDate":1727335923000,"src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png","id":11827,"alt":"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets","local":false},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"0c9f991b-996d-40ae-9b0b-129e0395d223","isBackground":true,"isHidden":false,"type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Oswald"},"fontSize":42,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1,"textAlign":"center","padding":{"locked":true,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">Potential Risks and Implications for Users<\/span>","marginOffset":-16.043999999999997,"x":17,"y":510,"width":378,"height":108,"tagName":"h1","id":"6031b35c-1ea0-483d-b7e3-380e7a38d1a7","type":"text","link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/0-click-vulnerability-mediatek-wi-fi\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/0-Click-RCE-Vulnerability-in-MediaTek-Wi-Fi-Chipsets.webp","desc":"the 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"4668008f-9154-462d-b811-2a00b12b05e4","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"7545661c-7389-442e-a6ad-f569291c56b5"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png","width":169,"height":300,"filesize":37359,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-169x300.png"},"large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png","width":576,"height":1024,"filesize":261514,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-576x1024.png"},"thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-150x150.png","width":150,"height":150,"filesize":25794,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x150.png"},"medium_large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png","width":768,"height":1365,"filesize":402021,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-768x1365.png"},"1536x1536":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png","width":864,"height":1536,"filesize":478467,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-864x1536.png"},"cnvs-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"cnvs-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png","width":300,"height":225,"filesize":65567,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png"},"pk-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"pk-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png","width":300,"height":225,"filesize":65567,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x225.png"},"csco-small":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png","width":80,"height":80,"filesize":8980,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-80x80.png"},"csco-intermediate":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-200x140.png","width":200,"height":140,"filesize":31880,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-200x140.png"},"csco-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-380x220.png","width":380,"height":220,"filesize":75283,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x220.png"},"csco-thumbnail-alternative":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-300x180.png","width":300,"height":180,"filesize":53343,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-300x180.png"},"csco-thumbnail-uncropped":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png","width":380,"height":676,"filesize":137758,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-380x676.png"},"csco-medium":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-800x500.png","width":800,"height":500,"filesize":256376,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x500.png"},"csco-medium-alternative":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-560x336.png","width":560,"height":336,"filesize":142474,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-560x336.png"},"csco-medium-uncropped":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png","width":800,"height":1422,"filesize":427568,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-800x1422.png"},"csco-large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-1080x680.png","width":1080,"height":680,"filesize":399538,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-1080x680.png"},"csco-extra-large":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-1080x1024.png","width":1080,"height":1024,"filesize":557647,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-1080x1024.png"},"web-stories-poster-portrait":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-640x853.png","width":640,"height":853,"filesize":298082,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-640x853.png"},"web-stories-publisher-logo":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-96x96.png","width":96,"height":96,"filesize":12207,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-96x96.png"},"web-stories-thumbnail":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png","width":150,"height":267,"filesize":31263,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover-150x267.png"},"full":{"file":"Black-and-Green-Texture-Instagram-Reels-Cover.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#63b0da","blurHash":"U73vgiozHqVryZozR3V?Hqj]yZfPHXV@yZo#","creationDate":1727335923000,"src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Black-and-Green-Texture-Instagram-Reels-Cover.png","id":11827,"alt":"Understanding 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets","local":false},"x":48,"y":0,"width":330,"height":586,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"4d1810a0-3042-43c9-851d-616380fbc92b","isBackground":true,"isHidden":false,"type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Oswald"},"fontSize":42,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.1,"textAlign":"center","padding":{"locked":true,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">Steps Taken by MediaTek to Address the Vulnerability<\/span>","marginOffset":-16.043999999999997,"x":17,"y":496,"width":350,"height":156,"tagName":"h1","id":"4e8eb314-8b5d-4835-a0d4-765dbb971a89","type":"text","link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/0-click-vulnerability-mediatek-wi-fi\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/0-Click-RCE-Vulnerability-in-MediaTek-Wi-Fi-Chipsets.webp","desc":"the 0-Click RCE Vulnerability in MediaTek Wi-Fi Chipsets"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"a4eea127-c889-41ec-a149-f8dd4ad8032d","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"7545661c-7389-442e-a6ad-f569291c56b5"}}],"fonts":{"Oswald":{"family":"Oswald","service":"fonts.google.com","fallbacks":["sans-serif"],"weights":[200,300,400,500,600,700],"styles":["regular"],"variants":[[0,200],[0,300],[0,400],[0,500],[0,600],[0,700]],"metrics":{"upm":1000,"asc":1193,"des":-289,"tAsc":1193,"tDes":-289,"tLGap":0,"wAsc":1325,"wDes":377,"xH":578,"capH":810,"yMin":-287,"yMax":1297,"hAsc":1193,"hDes":-289,"lGap":0}}},"autoAdvance":true,"defaultPageDuration":10,"currentStoryStyles":{"colors":[]}},"story_poster":{"id":11828,"url":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/cropped-Black-and-Green-Texture-Instagram-Reels-Cover.png","width":640,"height":853,"needsProxy":false},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/web-story"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/users\/1"}],"version-history":[{"count":3,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11826\/revisions"}],"predecessor-version":[{"id":11831,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11826\/revisions\/11831"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/media\/11828"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/media?parent=11826"}],"wp:term":[{"taxonomy":"web_story_category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web_story_category?post=11826"},{"taxonomy":"web_story_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web_story_tag?post=11826"}],"wp:lock":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11826\/lock"}],"wp:publisherlogo":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/media\/11731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}