Realtek

Rtl8195a Firmware

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.37%
  • Veröffentlicht 04.06.2021 13:15:08
  • Zuletzt bearbeitet 21.11.2024 05:21:01

A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "memcpy" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.

Exploit
  • EPSS 1.05%
  • Veröffentlicht 04.06.2021 13:15:07
  • Zuletzt bearbeitet 21.11.2024 05:21:01

A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "AES_UnWRAP" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.

Exploit
  • EPSS 1.86%
  • Veröffentlicht 03.02.2021 17:15:15
  • Zuletzt bearbeitet 21.11.2024 05:18:54

The function AES_UnWRAP() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for a memcpy() operation, resulting in a stack buffer overflow which can be exploi...

Exploit
  • EPSS 1.1%
  • Veröffentlicht 03.02.2021 17:15:15
  • Zuletzt bearbeitet 21.11.2024 05:18:54

The function DecWPA2KeyData() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an rtl_memcpy() operation, resulting in a stack buffer overflow which can ...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 03.02.2021 17:15:15
  • Zuletzt bearbeitet 21.11.2024 05:18:54

The function ClientEAPOLKeyRecvd() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an rtl_memcpy() operation, resulting in a stack buffer overflow which...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 03.02.2021 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:18:54

The function CheckMic() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an internal function, _rt_md5_hmac_veneer() or _rt_hmac_sha1_veneer(), resulting...

Exploit
  • EPSS 1.1%
  • Veröffentlicht 03.02.2021 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:18:54

The function DecWPA2KeyData() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an internal function, rt_arc4_crypt_veneer() or _AES_UnWRAP_veneer(), resu...