| CVE ID | |
| CVSS SCORE | 8.0, AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 
| AFFECTED VENDORS | Realtek | 
| AFFECTED PRODUCTS | RTL8811AU | 
| VULNERABILITY DETAILS | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of the Realtek RTL8811AU Wi-Fi driver. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of 802.11 frames. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the kernel. | 
| ADDITIONAL DETAILS | This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline. 06/24/20 – ZDI reported the vulnerability to the vendor -- Mitigation: | 
| DISCLOSURE TIMELINE | 
 | 
| CREDIT | Haikuo Xie 、Ying Wang and Ye zhang of Baidu Security LabL |