| CVE ID | |
| CVSS SCORE | 7.5, AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H | 
| AFFECTED VENDORS | Realtek | 
| AFFECTED PRODUCTS | rtl81xx SDK | 
| VULNERABILITY DETAILS | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Realtek rtl81xx SDK Wi-Fi driver. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of 802.11 frames. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the kernel. | 
| ADDITIONAL DETAILS | This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline. 05/11/20 - ZDI reported the vulnerability to the vendor -- Mitigation: | 
| DISCLOSURE TIMELINE | 
 | 
| CREDIT | Haikuo Xie ,Ying Wang of Baidu Security Lab |