CVE ID | CVE-2025-8302 |
CVSS SCORE | 8.8, AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
AFFECTED VENDORS |
Realtek |
AFFECTED PRODUCTS |
rtl81xx SDK |
VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of Realtek rtl81xx SDK Wi-Fi driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the N6CSet_DOT11_CIPHER_DEFAULT_KEY function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. |
ADDITIONAL DETAILS |
Fixed in v1030.44.1204.2024 - https://www.realtek.com/Article/Index?menu_id=848 |
DISCLOSURE TIMELINE |
|
CREDIT | dungnm from vcslab of Viettel Cyber Security |